file(r3, r4, 0x0, 0x4000000000dc) r5 = openat(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) tkill(r0, 0x3c) r6 = inotify_init1(0x0) fcntl$dupfd(r6, 0x0, r6) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x6a, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) r6 = openat$cgroup_ro(r5, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000240)=0x4) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r7) r8 = add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="ee6eb798c9def17ca0799e29901b89723306895ffb3acd84684b16d95ee22a3046333f3bcd4d11647335c0545121b909ac6576984d35d8eb245a8ecb7a082318ce2717e8bc9baea2bdf52069fa06567863fdb1dbb2bffcf0c82d1ffe4a3f57699db2ebaa98902a5b1885bd004185462384120c9ebb74203fd8e2b5b3fb23f70c86fc2ae8be5479500b0a943e7674798fd7ec9a303a8d2e739175403d74ff5c499b8c0a52c0b9f50e56628a2e8730d74b1df61151d4dd8ddf4a27", 0xba, r7) r9 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000340)="9a87787a7a0a2850d589d0a9703e4e57cf9a8af864a6f7277fee28908b10a5e7da78bb7acc5ca1d17283346922d595c1fc825048a428883e61d4ac7a831a3e44b25977110594f07c45dbb4ee4ec7afbb8b97c75f1097770c88581e0373cb63d78f5bc477b0cf5923c42b70e7780f7cf510212ad0461423e8e5a3d3c6326c80ca870000000000000000", 0x56, r8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r9, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r10 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, r3, &(0x7f0000000000)=@encrypted_update={'update ', 'default', 0x20, 'user:', '\\'}, 0x16, r10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 232.800966][ T9695] FAULT_INJECTION: forcing a failure. [ 232.800966][ T9695] name failslab, interval 1, probability 0, space 0, times 0 [ 232.814008][ T9695] CPU: 1 PID: 9695 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 232.822653][ T9695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.832736][ T9695] Call Trace: [ 232.836076][ T9695] dump_stack+0x1df/0x240 [ 232.840454][ T9695] should_fail+0x8b7/0x9e0 [ 232.844923][ T9695] __should_failslab+0x1f6/0x290 [ 232.849898][ T9695] should_failslab+0x29/0x70 [ 232.854540][ T9695] kmem_cache_alloc+0xd0/0xd70 [ 232.859343][ T9695] ? anon_vma_clone+0x147/0xcb0 [ 232.864236][ T9695] ? __should_failslab+0x1f6/0x290 [ 232.869385][ T9695] ? kmsan_get_metadata+0x11d/0x180 [ 232.874627][ T9695] anon_vma_clone+0x147/0xcb0 [ 232.879346][ T9695] ? kmsan_get_metadata+0x11d/0x180 [ 232.884586][ T9695] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 232.890436][ T9695] __split_vma+0x408/0xb30 [ 232.894893][ T9695] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 232.900740][ T9695] __do_munmap+0x80c/0x2520 [ 232.905316][ T9695] ? kmsan_get_metadata+0x11d/0x180 [ 232.910555][ T9695] ? __msan_instrument_asm_store+0xab/0x120 [ 232.916488][ T9695] ? __sb_end_write+0xbc/0x1a0 [ 232.921293][ T9695] do_munmap+0xc2/0xe0 [ 232.925406][ T9695] __se_sys_mremap+0x15fc/0x2570 [ 232.930406][ T9695] ? __se_sys_mremap+0x2570/0x2570 [ 232.935553][ T9695] __ia32_sys_mremap+0x62/0x80 [ 232.940357][ T9695] __do_fast_syscall_32+0x2aa/0x400 [ 232.945609][ T9695] do_fast_syscall_32+0x6b/0xd0 [ 232.950506][ T9695] do_SYSENTER_32+0x73/0x90 [ 232.955050][ T9695] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 232.961397][ T9695] RIP: 0023:0xf7fe4549 [ 232.965474][ T9695] Code: Bad RIP value. [ 232.969558][ T9695] RSP: 002b:00000000f5ddf0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000a3 [ 232.978126][ T9695] RAX: ffffffffffffffda RBX: 00000000203fb000 RCX: 0000000000400000 [ 232.986128][ T9695] RDX: 0000000000800000 RSI: 0000000000000003 RDI: 00000000207fb000 [ 232.994129][ T9695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 233.002128][ T9695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 233.010125][ T9695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:12:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = openat(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) tkill(r0, 0x3c) inotify_init1(0x0) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0xfffff, r0) clone(0x75020800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000040)={r6, 0xf9, 0x1}, 0x8) r7 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) clock_settime(0x5, &(0x7f0000000000)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = openat(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) tkill(r0, 0x3c) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:32 executing program 1 (fault-call:6 fault-nth:2): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 09:12:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$VIDIOC_G_EDID(r2, 0xc0245628, &(0x7f0000000040)={0x0, 0x1, 0x7fffffff, [], &(0x7f0000000000)=0x6}) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 233.814177][ T9725] FAULT_INJECTION: forcing a failure. [ 233.814177][ T9725] name failslab, interval 1, probability 0, space 0, times 0 [ 233.827093][ T9725] CPU: 0 PID: 9725 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 233.835742][ T9725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.845850][ T9725] Call Trace: [ 233.849208][ T9725] dump_stack+0x1df/0x240 [ 233.853599][ T9725] should_fail+0x8b7/0x9e0 [ 233.858072][ T9725] __should_failslab+0x1f6/0x290 [ 233.863053][ T9725] should_failslab+0x29/0x70 [ 233.867695][ T9725] kmem_cache_alloc+0xd0/0xd70 [ 233.872503][ T9725] ? vm_area_dup+0x60/0x1e0 [ 233.877051][ T9725] ? kmsan_get_metadata+0x11d/0x180 [ 233.882287][ T9725] vm_area_dup+0x60/0x1e0 [ 233.886653][ T9725] __split_vma+0x1cf/0xb30 [ 233.891113][ T9725] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 233.896960][ T9725] ? kmsan_get_metadata+0x11d/0x180 [ 233.902200][ T9725] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 233.908041][ T9725] __do_munmap+0x9f6/0x2520 [ 233.912585][ T9725] ? kmsan_get_metadata+0x11d/0x180 [ 233.917828][ T9725] ? __msan_instrument_asm_store+0xab/0x120 [ 233.923767][ T9725] do_munmap+0xc2/0xe0 [ 233.927884][ T9725] __se_sys_mremap+0x15fc/0x2570 [ 233.932895][ T9725] ? __se_sys_mremap+0x2570/0x2570 [ 233.938046][ T9725] __ia32_sys_mremap+0x62/0x80 [ 233.942864][ T9725] __do_fast_syscall_32+0x2aa/0x400 [ 233.948133][ T9725] do_fast_syscall_32+0x6b/0xd0 [ 233.953031][ T9725] do_SYSENTER_32+0x73/0x90 [ 233.957577][ T9725] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 233.963929][ T9725] RIP: 0023:0xf7fe4549 [ 233.968002][ T9725] Code: Bad RIP value. [ 233.972084][ T9725] RSP: 002b:00000000f5ddf0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000a3 [ 233.980532][ T9725] RAX: ffffffffffffffda RBX: 00000000203fb000 RCX: 0000000000400000 [ 233.988541][ T9725] RDX: 0000000000800000 RSI: 0000000000000003 RDI: 00000000207fb000 [ 233.996535][ T9725] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 234.004533][ T9725] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 234.012528][ T9725] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:12:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x7, 0x301, 0x0, 0x0, {0xb, 0x0, 0x3}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3ff}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x226}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1000}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x100000000}]}, 0x50}}, 0x4005) r4 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:33 executing program 1 (fault-call:6 fault-nth:3): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x0, [0x7, 0x3f, 0x0, 0x5, 0xac280000, 0x80000000, 0x4, 0x7fff]}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) shutdown(r3, 0x1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 234.665391][ T9753] FAULT_INJECTION: forcing a failure. [ 234.665391][ T9753] name failslab, interval 1, probability 0, space 0, times 0 [ 234.678235][ T9753] CPU: 1 PID: 9753 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 234.686892][ T9753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.697001][ T9753] Call Trace: [ 234.700352][ T9753] dump_stack+0x1df/0x240 [ 234.704741][ T9753] should_fail+0x8b7/0x9e0 [ 234.709218][ T9753] __should_failslab+0x1f6/0x290 [ 234.714201][ T9753] should_failslab+0x29/0x70 [ 234.718844][ T9753] kmem_cache_alloc+0xd0/0xd70 [ 234.723655][ T9753] ? anon_vma_clone+0x147/0xcb0 [ 234.728565][ T9753] ? __should_failslab+0x1f6/0x290 [ 234.733730][ T9753] ? kmsan_get_metadata+0x11d/0x180 [ 234.738969][ T9753] anon_vma_clone+0x147/0xcb0 [ 234.743693][ T9753] ? kmsan_get_metadata+0x11d/0x180 [ 234.748937][ T9753] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 234.754781][ T9753] __split_vma+0x408/0xb30 [ 234.759240][ T9753] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 234.765089][ T9753] __do_munmap+0x9f6/0x2520 [ 234.769632][ T9753] ? kmsan_get_metadata+0x11d/0x180 [ 234.774874][ T9753] ? __msan_instrument_asm_store+0xab/0x120 [ 234.780810][ T9753] do_munmap+0xc2/0xe0 [ 234.784924][ T9753] __se_sys_mremap+0x15fc/0x2570 [ 234.789929][ T9753] ? __se_sys_mremap+0x2570/0x2570 [ 234.795079][ T9753] __ia32_sys_mremap+0x62/0x80 [ 234.799894][ T9753] __do_fast_syscall_32+0x2aa/0x400 [ 234.805150][ T9753] do_fast_syscall_32+0x6b/0xd0 [ 234.810056][ T9753] do_SYSENTER_32+0x73/0x90 [ 234.814609][ T9753] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 234.820956][ T9753] RIP: 0023:0xf7fe4549 [ 234.825033][ T9753] Code: Bad RIP value. [ 234.829115][ T9753] RSP: 002b:00000000f5ddf0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000a3 [ 234.837564][ T9753] RAX: ffffffffffffffda RBX: 00000000203fb000 RCX: 0000000000400000 [ 234.845562][ T9753] RDX: 0000000000800000 RSI: 0000000000000003 RDI: 00000000207fb000 [ 234.853556][ T9753] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 09:12:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 234.861548][ T9753] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 234.869543][ T9753] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:12:33 executing program 0: clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:34 executing program 1 (fault-call:6 fault-nth:4): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)=0x0) rt_tgsigqueueinfo(r3, r0, 0x1f, &(0x7f0000000140)={0x13, 0x8000, 0x9}) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) name_to_handle_at(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x70, 0x200, "5d4cd02c18b5178128e0f9319995fc0ade6dabdccce0c83685e5faa884a40461c2775579cded6e49247dc1a0049948c3def9e1e44bd6908b360cf5bcda3ed7a1599878b79e32a113c1a4e4cc44eefe2562d777f7f7bcc9685bfe0c4cf8e89573e5014523bcd29ca8"}, &(0x7f00000000c0), 0x1000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 235.942184][ T9785] FAULT_INJECTION: forcing a failure. [ 235.942184][ T9785] name failslab, interval 1, probability 0, space 0, times 0 [ 235.955220][ T9785] CPU: 0 PID: 9785 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 235.963863][ T9785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.973968][ T9785] Call Trace: [ 235.977344][ T9785] dump_stack+0x1df/0x240 [ 235.981769][ T9785] should_fail+0x8b7/0x9e0 [ 235.986287][ T9785] __should_failslab+0x1f6/0x290 [ 235.991292][ T9785] should_failslab+0x29/0x70 [ 235.995942][ T9785] kmem_cache_alloc+0xd0/0xd70 [ 236.000752][ T9785] ? vm_area_dup+0x60/0x1e0 [ 236.005306][ T9785] ? kmsan_get_metadata+0x11d/0x180 [ 236.010548][ T9785] vm_area_dup+0x60/0x1e0 [ 236.014926][ T9785] copy_vma+0x8d4/0x1080 [ 236.019240][ T9785] move_vma+0x4be/0x1520 [ 236.023529][ T9785] ? kmsan_get_metadata+0x11d/0x180 [ 236.028773][ T9785] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 236.034893][ T9785] __se_sys_mremap+0x22b1/0x2570 [ 236.039896][ T9785] ? __se_sys_mremap+0x2570/0x2570 [ 236.045045][ T9785] __ia32_sys_mremap+0x62/0x80 [ 236.049850][ T9785] __do_fast_syscall_32+0x2aa/0x400 [ 236.055103][ T9785] do_fast_syscall_32+0x6b/0xd0 [ 236.059999][ T9785] do_SYSENTER_32+0x73/0x90 [ 236.064550][ T9785] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 236.070902][ T9785] RIP: 0023:0xf7fe4549 [ 236.074975][ T9785] Code: Bad RIP value. [ 236.079059][ T9785] RSP: 002b:00000000f5ddf0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000a3 [ 236.087511][ T9785] RAX: ffffffffffffffda RBX: 00000000203fb000 RCX: 0000000000400000 [ 236.095536][ T9785] RDX: 0000000000800000 RSI: 0000000000000003 RDI: 00000000207fb000 [ 236.103531][ T9785] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 236.111526][ T9785] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 236.119519][ T9785] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:12:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040042}, 0x800) tkill(r0, 0x3c) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$VIDIOC_G_EDID(r2, 0xc0245628, &(0x7f0000000040)={0x0, 0x1, 0x7fffffff, [], &(0x7f0000000000)=0x6}) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x406, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = getpid() setpriority(0x0, r3, 0x0) ptrace$cont(0x27, r3, 0xffffffff, 0x1) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000000)) 09:12:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 1 (fault-call:6 fault-nth:5): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000140)) tkill(r0, 0x29) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x0, &(0x7f00007fb000/0x800000)=nil) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1205531, &(0x7f0000000000)={0xed, 0x4, 0x7f, 0xfffffff9, [], [], [], 0x0, 0x8, 0x0, 0x6, "e72c96c2ed9f48838cb9b8fcf938cc13"}) [ 237.028059][ T9821] FAULT_INJECTION: forcing a failure. [ 237.028059][ T9821] name failslab, interval 1, probability 0, space 0, times 0 [ 237.041168][ T9821] CPU: 0 PID: 9821 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 237.049816][ T9821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.059929][ T9821] Call Trace: [ 237.063315][ T9821] dump_stack+0x1df/0x240 [ 237.067751][ T9821] should_fail+0x8b7/0x9e0 [ 237.072258][ T9821] __should_failslab+0x1f6/0x290 [ 237.077239][ T9821] should_failslab+0x29/0x70 [ 237.081880][ T9821] kmem_cache_alloc+0xd0/0xd70 [ 237.086685][ T9821] ? anon_vma_clone+0x147/0xcb0 [ 237.091578][ T9821] ? kmsan_get_metadata+0x11d/0x180 [ 237.096819][ T9821] anon_vma_clone+0x147/0xcb0 [ 237.101541][ T9821] ? kmsan_get_metadata+0x11d/0x180 [ 237.106781][ T9821] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 237.112629][ T9821] copy_vma+0xd25/0x1080 [ 237.116930][ T9821] move_vma+0x4be/0x1520 [ 237.121219][ T9821] ? kmsan_get_metadata+0x11d/0x180 [ 237.126467][ T9821] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 237.132586][ T9821] __se_sys_mremap+0x22b1/0x2570 [ 237.137584][ T9821] ? __se_sys_mremap+0x2570/0x2570 [ 237.142735][ T9821] __ia32_sys_mremap+0x62/0x80 [ 237.147566][ T9821] __do_fast_syscall_32+0x2aa/0x400 [ 237.152833][ T9821] do_fast_syscall_32+0x6b/0xd0 [ 237.157739][ T9821] do_SYSENTER_32+0x73/0x90 [ 237.162285][ T9821] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 237.168656][ T9821] RIP: 0023:0xf7fe4549 [ 237.172746][ T9821] Code: Bad RIP value. [ 237.176832][ T9821] RSP: 002b:00000000f5ddf0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000a3 [ 237.185299][ T9821] RAX: ffffffffffffffda RBX: 00000000203fb000 RCX: 0000000000400000 [ 237.193298][ T9821] RDX: 0000000000800000 RSI: 0000000000000003 RDI: 00000000207fb000 [ 237.201291][ T9821] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 237.209297][ T9821] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 237.217316][ T9821] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 09:12:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000000)) tkill(r0, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) sendmsg$rds(r6, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/131, 0x83}, {&(0x7f0000000440)=""/20, 0x14}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/96, 0x60}], 0x8, &(0x7f0000001140)=[@rdma_map={0x2c, 0x114, 0x3, {{&(0x7f0000000580)=""/253, 0xfd}, &(0x7f00000006c0), 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0x20, 0xd922507c}, {&(0x7f0000000700)=""/144, 0x90}, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/214, 0xd6}, {&(0x7f00000008c0)=""/210, 0xd2}, {&(0x7f00000009c0)=""/127, 0x7f}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/28, 0x1c}, {&(0x7f0000000ac0)=""/188, 0xbc}, {&(0x7f0000000b80)=""/43, 0x2b}], 0x7, 0x4, 0x6f1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x521, 0x98e}, &(0x7f0000000c40)=0x8, &(0x7f0000000c80)=0x3, 0x7, 0x4, 0x5, 0x10001, 0x10, 0x9}}, @rdma_args={0x48, 0x114, 0x1, {{0x6, 0x2}, {&(0x7f0000001b40)=""/4096, 0x1000}, &(0x7f00000010c0)=[{&(0x7f0000000cc0)=""/134, 0x86}, {&(0x7f0000000d80)=""/197, 0xc5}, {&(0x7f0000000e80)=""/151, 0x97}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)=""/82, 0x52}, {&(0x7f0000001000)=""/133, 0x85}], 0x6, 0x3a, 0xfffffffffffffffd}}], 0x114, 0x20000080}, 0x4000040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socket$key(0xf, 0x3, 0x2) sendfile(0xffffffffffffffff, r7, 0x0, 0x4000000000dc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x404c534a, &(0x7f0000000080)={0x0, 0x88, 0x8}) 09:12:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:36 executing program 1 (fault-call:6 fault-nth:6): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 237.843253][ T9845] IPVS: ftp: loaded support on port[0] = 21 [ 238.311609][ T9845] chnl_net:caif_netlink_parms(): no params data found [ 238.480035][ T9845] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.487574][ T9845] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.499301][ T9845] device bridge_slave_0 entered promiscuous mode [ 238.515387][ T9845] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.523200][ T9845] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.532689][ T9845] device bridge_slave_1 entered promiscuous mode [ 238.586329][ T9845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.604532][ T9845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.662745][ T9845] team0: Port device team_slave_0 added [ 238.673998][ T9845] team0: Port device team_slave_1 added [ 238.719160][ T9845] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 238.726512][ T9845] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.752777][ T9845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 238.768146][ T9845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 238.775464][ T9845] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.802349][ T9845] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 238.931185][ T9845] device hsr_slave_0 entered promiscuous mode [ 238.992399][ T9845] device hsr_slave_1 entered promiscuous mode [ 239.031065][ T9845] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 239.038696][ T9845] Cannot create hsr debugfs directory [ 239.345301][ T9845] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 239.478696][ T9845] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.521080][ T9845] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.628804][ T9845] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.847680][ T9845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.879134][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.888564][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.906947][ T9845] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.932236][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.942709][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.952080][ T3603] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.959268][ T3603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.012710][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.022426][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.032336][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.041658][ T3603] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.048889][ T3603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.057969][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.069040][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.079999][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.090485][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.100940][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.111451][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.130448][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.140119][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.150173][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.169900][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.179695][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.192440][ T9845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.237007][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.244958][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.269040][ T9845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.325730][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.335898][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.403431][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.414845][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.437190][ T9845] device veth0_vlan entered promiscuous mode [ 240.448702][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.458684][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.481226][ T9845] device veth1_vlan entered promiscuous mode [ 240.554754][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.564579][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.573911][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.583729][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.602287][ T9845] device veth0_macvtap entered promiscuous mode [ 240.635690][ T9845] device veth1_macvtap entered promiscuous mode [ 240.686465][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.697083][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.707116][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.717657][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.727721][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.738313][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.752484][ T9845] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.765545][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.775323][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.784593][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.794944][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.848375][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.858982][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.869093][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.879787][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.890251][ T9845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.900912][ T9845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.914715][ T9845] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.931577][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.941998][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:12:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r4, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040042}, 0x800) tkill(r0, 0x3c) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000000)='\x00', &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080)='^*\x00', 0x3, 0x1) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = fcntl$dupfd(r2, 0x406, r1) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0xffff, 0x4) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = getpid() setpriority(0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x59, 0x20, 0xe, 0x1, 0x0, 0xc2, 0x91809, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x1000, 0xd6, 0xffffffc1, 0x9, 0x1, 0x7fffffff, 0x8000}, r5, 0xe, 0xffffffffffffffff, 0xb) read(r6, &(0x7f00000000c0)=""/36, 0x24) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x44, r6, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x42}]}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "184a63b844a4dcc95260fb90bfd0ead81d1be10f72013411dab18123ee394f8110fee5044845a8f9e05240c4c573bc6290b633f06c7c7695f5a5567c2d4d5a3e74094397e8b14cbeb4d4d95fe338fd3b768d8dca092c5f0ad5538b170fa09a6a44ec6b487f65d7bce9cc9d9e2a42a901a73870a0a2fbc429628aefe75ef531d096fb42232d87e1d004628bbcb4d66008717abfe2de8bc4479a6a2b251a55487612926a6d0e52c32c966f15207494bb93587ec0cae2a227c176c23340a3b490e20acfc67bce997e5b733bfe95d1f3c484ca4797ab65c6dd6912605c4f3759c1b95577302f146415c1f3bb83fd2c4a76c1c53266057a33"}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "989762ad5b3a9533662c169e2857f1d2a5406731e19cba4bdde24bcecca217e2327cfc7e7a211aeb447fbe7b29650609f3"}, @ETHTOOL_A_BITSET_BITS={0x0, 0x3, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '/dev/kvm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, 'ethtool\x00'}]}, {0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '/dev/kvm\x00'}]}]}]}]}, 0x44}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x2, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x70128015}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, r6, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40004}, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xf38}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000000)="6d10b558471e71015ee695be1837344ffb7e3baa175c247d56ff23359e57e4897c98e6609a44256a4b86f43e6ca3075ea7905b9651bca1d530960edb1f8ac469befa9beb3ca3230a33412450b76dafda3c61f3c26a0223844eb3a7f646554e79b99965a1a7b4c666f89b181ab80c9fc3e4d0969ae915a2ead670c95ec234d3bff8b02f8d83") execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000100)='net/psched\x00', &(0x7f0000000140)='*$!!(\x00', &(0x7f00000001c0)='{---$,\x00', &(0x7f0000000200)=')^\x87,+}+[\'..!\x00', &(0x7f0000000240)='/\x00', &(0x7f0000000280)='\'\x00', &(0x7f00000002c0)='net/psched\x00', &(0x7f0000000300)='net/psched\x00', &(0x7f0000000340)='net/psched\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='net/psched\x00', &(0x7f0000000400)=',)\xe7}):[$$\x00']) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$VIDIOC_STREAMON(r4, 0x40045612, &(0x7f0000000480)=0x8) socket(0xf, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xfbb8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x18) 09:12:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @aes256, 0x2, "805bea6abe233fdd"}) r1 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x5, 0x20000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000080)=0xc3b5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) sendmmsg$inet6(r5, &(0x7f0000000300)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x800, @private2, 0xfff}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000100)="07d21cab4d4a7d1c", 0x8}, {&(0x7f0000000340)="a2d65c63824c12c8ccd46e2303dd62c66ce90a473f7e46df814dad", 0x1b}, {&(0x7f0000000180)="b5d547d61b1e6edb518f3b7af1e6b2676863158d914e388d5fa75631192404dfaf64b956382db350a31d0389ba97265195dd966a76a5b7e03e4927972209256694129495cdf17bd8a561f1c1c4dbe6dfb3c3ef234abb050918414d210831eb895fae2450002aa74fb3da950e5910ec1a2e00a122f1d2d2a9b4f9ca40275f1612c7b920f0b61943d696619469a8b11990ec6848b2e103c081da48301f3a", 0x9d}], 0x3, &(0x7f0000000280)=[@rthdr={{0x24, 0x29, 0x39, {0xc, 0x2, 0x0, 0x0, 0x0, [@dev={0xfe, 0x80, [], 0x3a}]}}}, @hoplimit={{0x10, 0x29, 0x34, 0x2}}, @hoplimit_2292={{0x10, 0x29, 0x8, 0x1000}}], 0x44}}], 0x1, 0x4008010) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r6, 0x0, 0x4000000000dc) ioctl$SG_GET_PACK_ID(r6, 0x227c, &(0x7f0000000000)) tkill(r1, 0x3c) r7 = inotify_init1(0x0) r8 = fcntl$dupfd(r7, 0x0, r7) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x4000000000dc) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x4000000000dc) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:41 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0106434, &(0x7f0000000080)={0xf70, 0x0, 0x1, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40106435, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x409}) ioctl$SNDCTL_DSP_GETIPTR(r3, 0x800c5011, &(0x7f0000000000)) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PPPIOCSNPMODE(r6, 0x4008744b, &(0x7f0000000040)={0x3d, 0x3}) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r7, 0x8008f512, &(0x7f0000000140)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:41 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000840)={0xcc, r3, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0xffffffffffffff48, 0x1, @in6={0xa, 0x0, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xcc}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r3, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffb}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x40) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:41 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x84, 0x0) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18}, 0x18) 09:12:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x4000000000dc) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 242.864162][T10149] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.1'. [ 242.874098][T10149] tipc: Started in network mode [ 242.879112][T10149] tipc: Own node identity aaaaaaaaaa24, cluster identity 4711 [ 242.887209][T10149] tipc: Enabled bearer , priority 10 09:12:41 executing program 1: clone(0x80002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000040), 0x4) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000890}, 0x10) r3 = gettid() tkill(r3, 0x8003d) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="864c4a6f0a36f4f93669958a06c2f297de451d95b886adc9f8dc328b31f821fc26a20f1c59b36583aaf9688b15", 0x2d}, {&(0x7f0000000200)="986e0a31147982c9318d82676763a4f6d0dd54a8c4c8884b4aca2cadf0a5b69beeb50e5a04eb534d6068ec9c8bbfe0af817a19576e7bd7d321ed4aebccdad3b6f4f9a6b0b8eb2d0e55725aea005f", 0x4e}, {&(0x7f00000002c0)="9dee32b9d7c23ac5ec1974d8d7044f2cb5f21e886c98a864146ad3d79987600538fee0aa5c751505d086f4077f6f9d5ea324a7f2462b39835fad66488c3a1e2f9fe1a6c1284b2a3a23d742964d2ed62d1c7659c3a467af6830e819d12fe253791248cb92e94b6b7990a14b88159d24045e29ca382d76356b9c10965a091550327637dff4d18475cac48627c631ddde2e83d662627a274bf3ed461e0205a560627c8cfdbd220f8dbb4bcd924162dd61c033bd3b52cc16ec9353819dff22492ea23aa50a33e7fc1908b69708f370de8653f74c6e669d14f3fbddab3f01", 0xdc}, {&(0x7f0000000480)="c3043310e58ae9b275679f3aa03fd57383c3262aaadf61d355a4cec75e250a2563b12dd5861ac671ad967e3a9de9a12096aa30a979459e7594cd9013a6b209538e93f643b89de42100a67b048dd927f74b57bec17e759c3bf954be9d4228094b85a9fff30bf77525c107d33d7c6508c53ea480725fd533bfb707d33bdba4da97c727884e", 0x84}, {&(0x7f00000006c0)="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", 0x1000}], 0x6, 0x8) getsockname$l2tp(r7, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x84, 0x0) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18}, 0x18) 09:12:42 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) setsockopt$inet_buf(r4, 0x0, 0x24, &(0x7f0000000000)="4347d1c94d9ee68efcaf3ee5033b78df6b4cf2ca269a4f33a2b06851b458be12d2ba5baad17ef655aa1dc824ad67bf2763e796f8c3d8d3f5d1de1cef991854efac5ed05d55dc39b5ea4b5366b51b1f1b4c8b3492501debdfb93fdf4cc072ce5a8b7636b7c5a998427e75e39fb19dbbaa58b7da50c661481f5b0cce73d797c1f650d03e287c16f0d22e65ec769058f05e16e3a4a8e761d83cc4573a5683d9dd4f199fb9eef3120fc1a2187b034ff47e6edc6034946e8b7b82c440a93987ffc2d6c27dc65d15b24445d313abbffe0649b472530330ff7a7bd9dfd1c75ee786425c3c2c45542046b4e60e3b4a3c12e240f3bb288334bb5a63e5f706b3d22421cb27e0a5d845698b311aa697194f631ec17e95711eb66ce771b287359ae585ea53a9687e086be05a9a25eaf82a7a7c03bd229bdfa2a311296128fa96c904de49e36b6cf6908d812569df64b068d78832b28e952aa008ad3bf4710b05518ccd3aa7b9a4cde282607288256e39de2bb146190a714bc0641f16d995ea385932bcb5975945947fb91f429b114b51fec863843336c891dac2c7a8071328e82da970a45984a7bb4f1e1f4364fcb915a3030b928e0879cded0956502836c2a1d7caadb891a5c518160b9d7186bea7fcbe5924bbcd9826be2e8e23e4e46decca237520ec37acb93404b4eed2d08187705b2b1939e54a055ef722781439b99f648e2c4efae3495e8ce1a8cc0743a291fffd8448722ea2cd3ff74400de28be261e603fe7fd37c22e252752ee447f852d8ee3e8949adcb4eb45e6f4f39a3d9745cc8bfb3e2c090f0aa6a71de761d9fe5e152ddcb6e5621f22a17e1577c5ce8823e0090858ffe3f5d667f4eda693caf1214aea54c7461913059697081cafa52ad6d78a92847059ebc4ccf591e2166c83b3b25d069a7cddfb41db8d4291f3376cef674098e0b874df9598ee2f9e005df25f7c4fe2c490c0a510dc4d9f3c0a221d3c99626475d9ec197faf85b3b3ef93a6aba54089676962e95ca069dc6de690e2cb766f95f0e5b21e6964e7aaa413b613d2d840b4ce114a4e8f5eddec15c70f95d8c2c7df04f789fee9be4cea3488d6dbd11b68dd21cc69c0aa93214f33478a07e33a3885840b48f020949c0cf64524fbd2d2de5e4630b2a915315627cc691d5f57f4edcb6ed6f619e03199073aa7814cd38f089edd7e1fc4388eda62784a47d10511e851fd820c42c4fae7e7a0a9e074203c2f6d271a7e7967f41d61d518465227bb2f703e1bef81910e027862b6d49022015206954193f5cb667007bb443f661a7cb73c507ee749f2d1680e68fad29b1c583fc9ca9246090a35a09b6b937269f7b0081c1c6b496473f25ead11c43091561ac514ab8fe35d643f13a5ca8d857edf05d8fd3effc2a77edb59881e08f7dc33c93ed319241c7aaf4326af53ac27dffbff82b1592795f209de7dfc2f79c3c9ab7cc5d271920002ccd7c8a33b5dbe997da9e51695b2722fd8c09ebec0ba063103a1935d4051a36faf4e22bff1dbb310c6f547fe4b7ddd6cdd1ae644f99deba5d0b22007045421fc77d853121c736020b161bb5798c1c87e511936a66abbedd8d0029630c32c25da81bc3ee8c5c9680792807c176b5fdcac9e8e470ca6549e74e00aa4c30a1bcfdbc77802f513a04e1a5caefc90329e519d9b7284586995429e7c47596e21b29d09eb70e6e0d43683f67b266197c9ae881c71ff23472f358494b3e204cf62367f4ffa0afa7b5db7ee0768e0ad4985047aa82a5ad1f5bc361038313d0c737a1bfa03820b1eeb7b5675e74473611e8b8d04b2129e73c4afb19f865b4be2464219cda5cf567eb907529700630ee03bac5dac7fb2518a7c92cf046a3fbe324c80f79ccfcf429d0ca5519cd1a773368443f26f0cd396f9c7d3a8ee86e907a9160f95cb6ccaba06fb0c0933c368979124fe8e530bbac4c3889af24f323b1a3fdc240282721172696aeef4c3d01209871a3b0c1d456e1ec8352deac53ad971dfc3481d08f2def4b51376c4b3f569ced5139a0134b00c607f3c9c94ed22aa644cda0f5263892c76d5fca2b06647af649957f02ef56104d2588789b4aaa332ab9489b24727f0118e60f85f7687ac50e25343eb52b8115dfc835d3132471008bae6438b18fa460f9b628d3afb9c2ab5e8795cf16165edd4eb1a86e54ef19240833c2cb1d2970ee8b33adf58221a96366468ffb28b7d40982e04907d38e3ed1b28228cca90bb11bfc5f65409174de37018bc704b429f1aaa28cabc149d2dcf9be54650a9606d1f50f9454d74fa87ea866bb8023da588d54b47b73675cfd3de402e6a03b7fe911fe28367fee6598ccddb2030d48f96315b32b0312a24f525c672a666c86bdf7bcc9491deba11e0fa8b2f21702a402589e60cc439afb1616a83a889d5da67bbfdac8860729bb0fdb49e8366bce59bd7d1b4a3631d3fb89088364a46945d831608771e43ba1e51f1bb3d24afc2ffe88ff4c57e589b064dfdeb68b6f4a65d5fba2e7f895ff196fe804ca3bf054b19e2dcb696b894f3cb227c9919720e569a0f8e6b505dbbcceebd69446db8a21b06da3aee080d0bfa6a15ddb7ce793b34ca3531da774b92a962476c3f4ccec871a7904539e66b91bbb28a19507e207c8b368c46462226c91346128a847243fd04d1ddad1280bec4bef5fe1380e33568b1fa1b0b4b582cca01be880cd036ec20691660637e43716dfff9ceeac3cc8b0e6db0cc2b65009dcfbcd67cc1c7cd3aa82ba9badbec4f638e59b1620067e492d93780c00c9254a113c045b9e425d21a39add369bac6b8704be90d8e002fefb8c243e0e71d49e3270ccd0c337b609b40d260d06aa15c7796e679e808162b95ae03720a1df182d3ba346c11cb00f354378c07415f936a3be0089c8e2aeba2f7080bdf5a6c4565e20c8d91967b88c4497d0c6547c804f06f22b54355a3680c77194d2bcd4d022a00976e045ae09d8907b1cc7f1f1dee433774cff0db948f7d4807b40cfcc08b8b4881cd1ef5ae274405679ad97d98f2331a0d4150f995041cc5f58029b5a475bbfa33f8a3161818aab7479d676486994ce386305a7ef66cfaeb5e0fad34a71c743d0967c108111bcd33e4487eb9f36b461029678bd173aa9062b380f8d50927fb3c49a9dbcdaceaeaed4f4bdc752548e2dd9c584936158cc36500843c64d2fadaa93bd74ad0661acd0b10e997d27618787b935937f2015942d242a79accb0e66ef10974a18ac903a15bb61e2eb32fa7d78e97f4e31e7335849bdd0c676ffd5d3ff29c53a44d8bde8a265dc4f07b323dfa08452acd492604bf0f8f1269e85dd17b0eb3ddd494475fa63027db4d135d42c8a85932755158cc0540fc582aded94c6dcc976665ee5be1323c4e53ceeed8762144dd759940724841b713be34e80b034291d6d9300d62da72d567108604f0937dc9062e62b8f4cfe723f37b689d96601198763092a2ea36b9c8b4cfb63d7ae102e0cec41a4c22629aeeb0707e0bff398d6cd93cae9e5cf81cd35fb752d6821ca8b900079ed9e12ccd20550146f78171a10ea89d16d243e5c2b0866a9b9dc8503d4b163bd118ba2ae759197d9a63fddb19164b502fb3b3c8277c7b6e5055a89c35d17f6326038a30e73434ee9eeec0c1fb78a2583a9c0398079fd58bdfd02ac415b03e8660324dbbce42e9a0a4d7997b202215133601c487a000e1f0e3d38aba4911f52cc5dcaa73f555349ae66a04df1583dcc64440524b203dcc0399897244874ed534f490d9fed83b472eae3a343d592ed26e0b15c93791bec37805fdecfc736547192fd3766f528b2292ded4061a9314370a8843557dd798ef739b868bd9988567660b2732687ec07dc0cc76c9062a84adedbac8746667018889ed16fd33549bae293643a279be1154896df64b3e16dbb1a31eb7f28be415bebc65cc91cd54273f021c0d3e3dd120bf339e43b93c8e46b3d843e333885dcba198368ece43ec427dd722a35d442bdafd74435a7da3d97e7a5b31d2ed751d36801063c437a29f97d0eb8f4f28c6fd072412f0b2ca046d51888856c64d1ac7df2c80721bf012f7b47b4c05385a065ae2a77bbc93baf8ab528696b68edf4ccfab73624e1611db6ead77c0e4b775d7e7fe49337396e6b23723a17a81806f632435ff37a9e0782f469e589fb73219894621d12c6163ce680a26421bad77331c9f79676fa63b16cfc2ed47ac5ce10f5bbdd3f0195174d2f9a530ebcd54670864a4cc134bafa5edea4b07f9472d2d11b51e7bbfbd71f91a40c42a75de37981e154e2522da8d5d89c9071d09145c1287d9aed7912759fb2da266cb58d1a50743f70685f076711924bc1c5d0bce246546ce770e3b1fa436c75cb0c57e2c757e9c79178a914f4ac577255cd986193512ffbb967237c608e435d8b14735e7bed235eb768471bfafb8020850848c5aa010f03473e15cc7e370f709284305ab00b9008283d651f8d06430efca2ab5ad9a41bec681049a12510ed80d541006b15ce74f7c76bc8929049d5afc6275aa02adce3b3da60ed6a40f435c99515bb28fa07cbaba892711b400eb1d187a005307f758ea2871d4134ddaaa1b2c529fb38becae2c30988ad78aa3c4b95a477b64e05d2e66e1a0ebfac186e4e346191d76055cf764a274e1f4c5ba5ef58da50b44a4b1ad0870a071b800ae94771dde3f279258b1905e729e4b2caee5d4c527ce3164f9d76fc1b88346bded3a204e40ca4ac69699ccaecf00972936a2691cf75fefb47018f85a8b6b13ff4696038d000e7da4d0279de4d0542f9d929ab28a00f04a51f4fc10060b36b7100369f4914f045cd03ed4994e0014799355b2b4e34ba61a274e5efd2b5c804a94524d07096e4586e67f88b6dbfd0115fdd788b177a425fc950085ad4d849ace79dbcfa2c84eebfe00c8fae9031cd38e48c0ff56544dcda8b8c7fb83149d30a2ce48bae4c96b01960a95d7a5b9d4e5366163eb8689d9c95f97436185132ee1be4a218976f07ee9f5e660cc928b17a023a4a2ff1429e571bc2d377580aac4450e552989c700b4e826f21be5c9a8e908e15e3cc5633a0a26eb8473670d4e3162b79ca081de7af6139b86cc023c138ecbcff562da256b56391178f3a74fea298fbd092250e22e466d3d264d8e2d4680ad46a15cd0600bab0a23d9b757014cbc617c8999bf3c185559c2f05837f4168cfcac292a272510ee5bd2813584a2105d3c341eca1c0f64a9cad290a6ebd815b6eed0955ac97264e3f45ebbf97f434c4e34c71de20d6162bfda0cba67367024d1f6597e31ded7f34cdb459e11b92f5ce4799a72b9b7097f975278a971c87d06ebee28733278aaaef320ae314b549d26bd6ef887703cf8db99df7abc7f92defcd0b80ac2e77c86d96628eba2b49c0a3999ed4533e8fe98658597015daaf2300ad1d6fa0e4147a2410007f01e4b060d3a7cfd56bb0957f1b5d9beb1d833a098a5d909ed5a615adb26f55bf3f9b432e4dcff898d55da45203e88cc3f6d6f574ac3cc1d55786817de88398b11efd456feceb839aef536d3ee3f4ad29d7b8b48b673ea078d2a6e6e8564e687bdbbc8c8f9ac99d2b999634a7665db3921691b02327210f5656bc0333907c3987f42a99e466381caed162c5d57737360992fe3976314a17ed259b8949762520a2b00b7773d7c5a89075de7266f27f7a9ab8372aa0830715e0df0256d9b5426b27ac7076ef3d98635827bc03a8119f47a072eb902309a28d26ccf1022b39d0096747b422de063969e31e6918944d4c46429b49d9d9f270c283605333f53e5332e", 0x1000) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x50000) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fspick(r4, &(0x7f0000000000)='./file0\x00', 0x1) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x406, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 243.881129][ T3067] tipc: 32-bit node address hash set to aaaa8e00 09:12:42 executing program 1: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @private=0xa010101}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}, 0x20, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)='bridge_slave_0\x00', 0x8, 0x4, 0xfffe}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getpid() tkill(r1, 0x3c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x84, 0x0) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18}, 0x18) 09:12:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000, 0x7, &(0x7f0000f9f000/0x4000)=nil) 09:12:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) write$P9_RRENAME(r2, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000040)={r6, 0x8000, 0x1004}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={r7, 0x40, 0xa, [0x7, 0x4, 0x9, 0x0, 0x6, 0x0, 0x3, 0x7ff, 0x8001, 0x5]}, &(0x7f0000000100)=0x1c) r8 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) 09:12:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x84, 0x0) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18}, 0x18) 09:12:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = getpid() setpriority(0x0, r1, 0x0) ptrace$peekuser(0x3, r1, 0x4) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800280, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) r3 = openat$ipvs(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$inet(0x2, 0x80001, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) pidfd_open(r1, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)={r6, 0x100}, &(0x7f0000000100)=0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x6, 0x1, {0x1, 0x2, 0x2, 0x0, 0x9}, 0x9}) r7 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:44 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x84, 0x0) 09:12:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair(0x0, 0x0, 0x20000a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000040)=""/147, &(0x7f0000000100)=0x93) tkill(r0, 0x3c) inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r4, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') fcntl$dupfd(r3, 0x0, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:44 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) r9 = getegid() setxattr$system_posix_acl(&(0x7f0000000680)='./bus\x00', &(0x7f00000006c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x0, r7}, {0x8, 0x0, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x5c, 0x2) 09:12:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000010002000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040001000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="993bbf03e149adec248edf903d0c649b0b057974fbb58a21b44bedcfb4f54c97184503b472d28149609053590429251e5d44cd08af941cfcd3e5530a7854b7f6c0416c573ae7af66b677382e7303618dfa727ae89037d78fac43960c7e052f685bd82786039aaee68f92431b3000a6f01545f907091c20f4d3d0b88c0d3ce88955b6aad3d3181c47117c8657f0a36243d75682c47bdc27b07fc10cb3787d2f45d6ea1519f71e1c3224a422460f79ebdaf40d80674aa025f585ae892641658e7762047285ad099044", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000740)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=0x0, @ANYBLOB="040002000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800040056c8a3969ce0c6d9da9d617aa09ee863245d4e790be6", @ANYRES32=0xee00, @ANYBLOB="08000500", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="10000400000000002000000000000000"], 0x64, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) read$snapshot(r7, &(0x7f0000001b40)=""/102400, 0x19000) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r9) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x0, &(0x7f0000000640), 0x18002, &(0x7f0000000400)=ANY=[@ANYBLOB="646d61736b3d3030303030303030303030303030303030303030303130aa36a30000000080000401b0c19c637bff99d55818707e616973652c646f6e745f6d6561737572652c7375626a5f742a7d7b2e7d4546170b76a31e241b9c65c1004e88d3a08fb2264ef8eba057a28125e10041e2a21b967cf9c5e56bf21ecb1e50888562912adc56cad3dd85f00876", @ANYRESDEC=r9, @ANYBLOB=',appraise,\x00']) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ef8000/0x3000)=nil) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x30) 09:12:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r2, 0x1, 0xffffff49, r2}) 09:12:45 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) getegid() 09:12:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000), 0x0) 09:12:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$TIOCNOTTY(r2, 0x5422) tkill(r0, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r4}, {0x8, 0x3, r6}, {0x8, 0x6, r7}, {0x8, 0x2, r8}], {0x10, 0x4}}, 0x64, 0x0) 09:12:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x9, &(0x7f0000000600)=[{&(0x7f0000000100)="01a60b6a8e28131dcbd80f030c63ba066cd19bd8fb9159174308458b953443429bd4014d7b5d63341ecdff6d2f81ed8cae85458fabefd09059dc8a9c27d937a7f3826437a48ad99f39f0f8541c7ed42725bbab9cae97093b7254631396b403c989a4f70a5fc7ff70c38a1531933ef38a", 0x70, 0x4}, {&(0x7f0000000180)="97735ca27d4116d4a261169cc0629bbf62387fae4dd129d43914129450a7d9b53373e9cf9880caf82a8b54dabef125d5b866095df15c4331344022904fa4", 0x3e, 0x9}, {&(0x7f00000001c0)="bd7068f1a5d1a3550cd058d54637480fce8803c8ec173c5e682ebf81b12334fb7f42c1de1ac0fe498a37b20e0789176ea38cfa3748ee60f59ab755a3d0cfc3f2c325a39497300d198aa393435573d23a8b199add9d5c4eb0fca2455ec0e128a85f8e", 0x62, 0x6a}, {&(0x7f0000000240)="e67d5a257d7f0503227507cfef9f0f8caeb8952fa657f0b71d806e00062f158133456d64cced3f669625cba62e650a0ac09775ea307a4b930b7ccd1cd05de5bf7217b2982d284aa6214fe43a08cb251dcc179e5f46a35568ccd5a34afd02f87f89f1100b0d016b408b813082079eb4a61be166122e1ca474838e4af4b905f407b16cbc324ff2b6b0092b9b9c9cd5c1ca69d91a9f21dec833cb97adaf193e2fe4e20daea4330611b12f0712aaf72c644b8fd5714c00f3a6c5665d955ccd628133bfafbf1f5f13", 0xc6, 0x9}, {&(0x7f0000000340)="a0cd6f52746418caea9719220648b454aa25f05f6446b319", 0x18, 0xaee}, {&(0x7f0000000380)="acd673b55665a9d1e05f4211e6ca3a816a078004f4412bdab8da84ff3b9067d2bf7c8b064be43303683d31aaa7c6be3b1808fff09c4732dade3eac4760b4e2214bafa7a49c47dfcaaf683c313535567928d599a779f6943451ffdd17a51761b6fd027a5d3d2d616c8c42f65132b5662f593b9a160c8ec890e117521b33f5ecd289d9667bac32e63912330de56826927853e00cdabb2eacf0cc993e39e6a2510e307a05d0cfc803f68039ae22a5fb63d5318ef3ee4c3360d2522435", 0xbb, 0x5}, {&(0x7f00000006c0)="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", 0x1000, 0x80000000}, {&(0x7f0000000440)="8b10e374f4e8c7f87c4018201df0f2a412714f3b9ef2d31df63ee86d54699d103483e54664ca560effdb1fe385ae7a83fde0d151e2a5740b71df80315d306375383194fc790411883d68971cd741616ca90401089449ca3fb9f2b45377f2e57ba311ef169d38e13a11c3578f46880e99f17261b43762bcc441c361382da58da2602a9411627c29294bf61223ad7776e3a47a3915934e90112c7a8318a1080e67e856f8ee9ef18cb279a8f345b4f757c5550f8dbebcfc8d949f81e6bb1250deca412be839a7cb79677a50edf7f7dadc77d95eb4ce990538181221e2693129555af0b947a16509dbe8c0a0354ed2222e0be2d6ebbe481b1d9f", 0xf8, 0xfffffffb}, {&(0x7f0000000540)="0374fa88fb8cbf1ad68986b3c38a09bd8dc5eaafa3fcf84c188a5cde023b34756784f85e0c37e7d7c44158f293f3814792e45be8094265e0a0503edfbc3a62d0a9f8e46ec4b7663d1d7b1df5e13a46f2649323a2d2cf6f4ab679caa5ea2674fb5a2da2f2ec352ac51a5199951ae98bee4a43414820ace8c1400922625454231d14782156fa036e9437006529e1addeff106123", 0x93, 0x6}], 0x820, &(0x7f00000016c0)={[{@block={'block', 0x3d, 0x200}}, {@hide='hide'}, {@utf8='utf8'}, {@check_strict='check=strict'}, {@utf8='utf8'}, {@norock='norock'}, {@map_normal='map=normal'}, {@sbsector={'sbsector', 0x3d, 0x4}}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@smackfsdef={'smackfsdef'}}, {@uid_gt={'uid>', r6}}]}) getpeername$llc(r4, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 2: gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x3c) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x406, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)=ANY=[@ANYBLOB="c40000006b46a726c5c685f945f757693c274a77a65b9a50e1a4bb7f2dbd23a6068847679fb872ebe38f7a15faf71d0484664ec98026bfca01554bdad204cae107513b9e04dfbdc344290cfca976a4d22f8be4cfae80a3894e56ba6a84d7df6d1e5984bfb0ce005aa28f457ab45f038359e031440bbec7e7fd9edcc0944ba02475e3c638fef0de3d7dd610368ac17ba268e85b3772ff79a026e488d50327d42a", @ANYRES16=r4, @ANYBLOB="6ffe00000000000000000300000004000180b400018008000300000000000c0001006574683a64756d6d793000000d0001007564703a73797a31000000003800040014000100020000007f0000010000000000000000200002000a00000000000000fe8000000000000000000000000000aa000000004400040048ff01000a000000000000000000000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001000000000d0001007564703a73797a3200000000"], 0xcc}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xec, r4, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x6c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8e}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc526}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc52a}]}]}, 0xec}}, 0x22000041) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:46 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r6}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) fstat(r1, &(0x7f0000000300)) 09:12:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) sendmsg$rds(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/136, 0x88}, {&(0x7f00000002c0)=""/205, 0xcd}, {&(0x7f00000003c0)=""/196, 0xc4}, {&(0x7f00000004c0)=""/255, 0xff}], 0x4, 0x0, 0x0, 0x8800}, 0x24000004) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x2200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000040)={0x3, 0x4, 0x8, 0x0, 0x8}) r3 = gettid() tkill(r3, 0x3c) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)={0x0, 0x0}) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r7 = openat$btrfs_control(0xffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x1a3725, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x1f, 0xff, 0x0, 0x0, 0x0, 0x94600, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffff0000, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x0, 0x1341, 0x1, 0x9, 0x34b, 0x7, 0x200}, r6, 0x9, 0xffffffffffffffff, 0x1) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000100)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x2, [@remote, @loopback]}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r8, r9, 0x0, 0x4000000000dc) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x12, 0x10, 0xfa00, {&(0x7f00000006c0), 0xffffffffffffffff, r9}}, 0x18) 09:12:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ftruncate(r1, 0xcf) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000afa000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffe01, 0x8, &(0x7f0000001400)=[{&(0x7f0000000080)="689143bb104f96551809d555afa9bf500430113732fa55358a5536ce08fb100ed96452d248b6b673a8aff0abfe333afb64091a03727c53cf52625dae7b08b2a501e26b7d4f0945e90407b0706840", 0x4e, 0xd6}, {&(0x7f0000000100)="e3af4fefc659c06d", 0x8, 0xfb}, {&(0x7f0000000140)="e3aadb3d808c97698eb4f07a11605763b9a9203e53f4b6a9eda96dd4fb1760", 0x1f, 0xfffffffb}, {&(0x7f0000000180)="26f13363de784944abe28cae4a7be2de74155134268b9df966934d2c1faac195679508202fb64389256095cd07463a2b4e6e2c030519c7f275b888045597a9b2b2a42d45810fd549821312bfd07ceeb178054b3ecce2e88f3702d7b0433825827801e5a7e6ecb4d5c26f6c8f0f029dda1495d98fe27d3c0961bcf8", 0x7b, 0x7}, {&(0x7f0000000200)="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", 0x1000, 0x6}, {&(0x7f0000001200)="0c7a1e8c0126c0c5b0d79e9893aadca794ea3fd350f9f6da0dcb71643cbcf819f227a13bf1b8932a8fbb6eb1c32a51a5d69dac05f41bd7ba39ab4b2bd8f568e3d51af7a4b112cbbc8f0d8c9cccc90a2d86297254dee8f412c4bd5e7def658a681a21bd6ecf558b03a730cf32d537f217f595fc3b00aa6d621c07398912841edf3ac5fea46ed4a52daed2dad594d6ba6a22c44cc55fa62f57467745172edd19ef1a0c57176bb2c5f3997f5fb7bde20f23be232b3d522f13d2215fb37bb2467784f0384681125d5478d2eeb8cf2868bc2a814bc6d44ffc720b924bab6a0d11dd0508", 0xe1, 0x100}, {&(0x7f0000001300)="e69d0bba63672e7ba8d33f", 0xb, 0x7fff}, {&(0x7f0000001340)="65d8cae5ebd9c7d72a1168d5a97c0bc42096655231c20265f5775f460a22cda157d81e06c4d55870501ec42e16c6f0b12478d6d3eeb2a34208f795260e56d0175f9074c65732298d3f7a3ae7487a315bf77a7a7e2fb54e24bd6488a3c35471604a5ff678861f50526feaf58b5c6002708563a339290c397851d45f4378829e97b42800ad41306308e4625fa063d1c204432a1f9c55c287d2a2256487c1c0d86de1683ee244794e8fdca1923f9ee4fa5eec2b2713cf", 0xb5, 0x1}], 0x0, &(0x7f0000001480)='/},)\x00') r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)={0x24, r6, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x980}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x2c, r6, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x2c}}, 0x40000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 248.436379][T10443] nfs4: Unknown parameter '/}' 09:12:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x80000) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r5}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) 09:12:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000180)={&(0x7f0000000000)="378bcf8274aa70f89967718addb8295d919a8119abbf22252a0b1e389908c07f98a02cebafd6b038ea74e31e51481ff13304547c5c55485f212e1930", &(0x7f0000000040)=""/62, &(0x7f0000000080)="638c1325b43f8afac28f0813186235042c29110eea3e899d3ff28d45daa5633f858aaf0165c20ea14faf4ef0e194b30f2ecbb7ce8433c4b869821bf53c07eb42fc083616834fcf0b1bc62838cc0edaac455410490cacaca5620ab602260a6e0e872fafcac8614414046a", &(0x7f0000000100)="f4bc6a776c793431c07697cfb40387e9bcc09d0d5a1a3f80d36350bebefc6b8f52803ded22b8ebef21dd3a5e936c39ce6446c751e9caaf1689", 0xfffffc01, r1}, 0x38) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00007e2000/0x2000)=nil, 0x2000, 0x2000, 0x6, &(0x7f00007e2000/0x2000)=nil) 09:12:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100000, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@mmap='mmap'}, {@cache_loose='cache=loose'}, {@dfltuid={'dfltuid', 0x3d, r4}}], [{@smackfshat={'smackfshat', 0x3d, '^[\'\x9c!%#[]-&[*'}}]}}) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = getpid() setpriority(0x0, r3, 0x0) tkill(r3, 0x1a) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:47 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r5}}]}) 09:12:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_KEY(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_SEQ={0x9, 0xa, "abbb5f3f15"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "92e1f98e7e"}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000820}, 0x10) getdents64(r4, &(0x7f0000000000)=""/172, 0xac) 09:12:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x8, 0x0, 0x81}) 09:12:48 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r2) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000080)='/dev/dsp\x00', r3) sendfile(r0, r1, 0x0, 0x4000000000dc) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x5, 0x4, 0x2, 0x400}, 0x10) r4 = gettid() ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0xc004500a, &(0x7f00000001c0)=0x9) tkill(r4, 0x3c) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) openat$dsp(0xffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400500, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x4000, 0x3, &(0x7f0000d2d000/0x4000)=nil) 09:12:48 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:49 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x20001) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:49 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r3 = openat$dlm_plock(0xffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x3179, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7ff}}, 0xac64}, 0x88) 09:12:49 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x45c880, 0x0) inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = fcntl$dupfd(r3, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) r5 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f2, 0x100, 0x70bd29, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x884}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000016ed2142de78052cbd700000dcdf2500"], 0x14}}, 0x800) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000001000010800"/20, @ANYRES32=r8, @ANYBLOB="00000000000000000c00ff800800017504000c80"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="68c24f000226bd7000fddbdf2516000000080001000400000008", @ANYRES32=0x0, @ANYBLOB="0c00990005000000040000000a001a00aaaaaaaaaaaa00000a001a0041290f5d358a000008000100030000000a001a00ffffffffffff000008000300", @ANYRES32=r8, @ANYBLOB], 0x64}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000800) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = getpid() setpriority(0x0, r2, 0x0) tkill(r2, 0x3) r3 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x0, "9b0a274d8b2869e6242d93dc4c53dca19441e7560b9cab53668ee3ce2f41d8efaf759afe887c96cd47036e8a2f3a3ba4d80d58db64819f7d6d6f9ebdd69355d7e8465898885578e3001998ec0da98af33034b6c189001498cfce8419b0611a37180b4336b448bc642d5915c295f601f1c167a96675750efe7309bd91f48f9ecedc14f0ae4d076a0ced31b6428c51b045938b596f6e8122288c2f97a1d6bb4918935ec9234c55e82ab3c0d81945eb680cd57fa5396fd21d39d7b87a1b75363ac86b7c1d49d90873247c8b4d8ba3a28921f6cdf87e604d32d841af09f09e8402e4f8c31cf9d087301fd053a92cb5128fc8fae4dc724d863c665effb78352a1a5a8934fb2c042d09107611be4f773fbdba8a0cff9fc4a5d3d9ac293d94a061d1f25813e7c09576a03d593b2283912a77ce2026197a3df3014963412fed21fa189060cfe9c7fdd73fb1955c14311abb42b2c4643b55dd37abd1cc93fd6ec477fc530dbe7f56b9290b067eec6fb3a871c4849281d6ae335cf44c0fb2ca6f2c385b03a90867ec7eb4618b5ae83657598e6747995bd98fbba5b23d4143e61bc66a3634c512178f8252db2b00fe3756d1f1225446d5f3a59100607833100072d845bbb9dad177116ecb5e2c8da3a4705b835fb8e5cabd2068d2fcba3290c8836144b7f371bb4e222dc079fcda8a264d64f450f73a661b8527f28b21da3d7d532210ba629"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 1: clone(0x20082004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) r4 = fcntl$dupfd(r1, 0x0, r1) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000080)="a9e2", 0x2}, {&(0x7f00000006c0)="df748829a479b0dba97032bcfeea09d9b3a9f72956589123e18150e7af85b2d35f20599bea660d23f14c3cf7fd8d1d0089d067aaf362037ef0aabc970ecd71d768fa6e99dddc63c9748b0801600f58ce3e8bcce7a775745d18efdb0f4d189f34113d77dde475ec7b1db289d3690835543db15d93a8d43bfff2123054a5cd66a5cea625b5aa6249f040b74ab4848543e2006a0390f8bbbc9100ebe1f507fad1dc351c8310a49160ead69f86664c62fbfd9a806fc64548fefd7044f6c8e5a09eb76d7da825cd60b433e65556e61ba7c0a2b4ad40dc09725ba3bf0ff98bf7eae6c68c09c879e62a9c7b0f5e0d7e1cf6d037265bfa4778714104c9affde96211fd63c9e02315d8c27142c1c1a36201d23a4d26339168950f9f588987a530b6ef99ec64cc8648e0dcf121fbd0edbf65dc1932e3dc1ad7a0b0b0da9ef123451dec9478c33fa29a52b5a43f4383e389702fe2fee60c0b865cf3c1995af4fcbd9659830ee332d8b84f0e4961c59c99e63dcf02c67862d7aacead0b1dba11caa0918eee10808827a2641f80588aec4785c485996c822db39b7c67ec92accd11436fe5296f3200a4387780f4f8d4b1c0c0c14c01d0172ebf0d2df6510afe8a83d6dd97135a307d37743c31bee669eda5d572f9604e9784a2b808eb6fa1d844ae9a7d342f23483e24f70539bee4683fd0f53c2aa173e4dcfebeb8406eeeaaada2faffe00c41499f1a0d0a39abf3863ab99d11f16109516985539e5e2568eb04194be653563de78e743cea5c77437fa23990a9e6d2f797dbb4aed359ccb6023c22a6501406be503980c5094cf50f28c88cba943e90d2490e877b1e657fa08d462cc57d2721c1736e36b0ff0cce6b0a8cb0fba79f3236b8da5c2e11e0312ae21583486cf0a261e7d1fec111dcd1fc69f609c82dae8f77e0e8321a04679e710346845652365c0166f1c69178e031611db5ce7253c7b467fbffe74baeecde0ce8b0c00ed86080120e8f0ba38219726ebc885decdf12eb510c8d10e0487731b1f99a424ba3d89f2ff4bd3a4d1b52dbb05922f83320c1162f8d4bcf1cb3c2cabed04934d7ef0d07d78f67eca24f182b448e3014ee5dfadda7c1b966605509371b387c039f3db0a8ce87f98f52b353920bbe41ea35f3a7f60beb276a7eaf45003753782e307b90ac5f005f549ad86fd5dc150fbb3f9c214c2d194b80f9374a50bebe26b1eecc91a159b36d23603d8fa7406230a82e98b77447f404d6cbbf9f6458f2afbd67eb408c96033e223c0b02022cfad0d5e8248522853e01a99f72c2b670ed8d3c27b4c22753b7838284cfa8a6e1f4e7d0f4863434420e72772284397a8b551a7265ccd7d6979ad3b73659f84da3a88197feddda27f875e53ada518d372c808728ef7bcd236cda33307400c9d0bc9e401f06d03c44215da759b6b408e4887d6b6567194930492f3184479ca7bb9f6f910af523f0de1e054f741998a1232acf1206f28571550d24f92da29214f0a009dd5275999efe405329b2973d23f56a4f6ddc686922ca3e4a0f1e70b76e2a6876236e6a5a1c03903bfe1e0ddb465d7f8ab709ba1fa96296cc34588b32e23ed6f978c3c3df2d9bf2c238c0c2be62f893457b7c8e82eff55cd56941c02836e2e4fb2b40674dbd382372b7edf596d8b905681d7625fd2b4473bebfc7b2eb67d2df397a47d065449570613ffea0ea4f49342721ad4d1ca7f6a8b04422762f53a4841706151a05fe0e8e71f601c9178a2230b82cca03ef7f3c0eca74a64cb6238aa0238a50569e0b4504540c4e34db9e3ad4022296713d2c3dab122338d197e569023e4cdeb92fcdb12b48177d32337bb3a44f309fe256a403ecad11f3f7330b10dfb22cffe60471c3619b34da761ac3c5e93a4b28f64e38cef2fd8d76cee918d44e8c48a0fc298051588a192cd233822cfbb2abfa5d7861f493f827a16e25078becb09fa567b4fc51244f3395ae9469fe7653fc18017388fc22ec528a7415506eb7d52fb16f3578fae18340e7f106286e355d295cbbf7fa1c3883c652c6646bb5ce14235c134749585ebf3eb8fefc3c269105eb691362069d48de85a03c30918fab65d050450591efeaac8710e11593ab9733d56d005b919511cd94330ccb1ab71d008d15ef8911047b107413180e6d93782d5fb10419c55efc87d6911ddd82802fbbd3171da6726f4c1e8946bd0a1171bf1cb1b1aa9005644bfe004dd62a811e5c25e72f7cbd7d9d79d1e8eb44856a379067db1c7bb328dd9d94cba9da3fea80632a5a52f93393592b9956442bd6cda151b9f2b0b94659c9818a0e61c979ee219c8cbca11e4e5680f9e26d413a0f48315afeb7912bd80a0a761e7dd627c3850a0754a671b1a071c84f4c9fe9c7980abbbe24b2981a9100b744f0a2b09f5f3091e559cb94b7d8fb8a5837a2d32e0dc2eb3f851edd7bbdaae0259317caeae13a121f09c9ae4940fdf960809f485e9f2925d426e15fd235fbedc553ee483918f878a7c3743cbbbe93b507c9ba8ac9e5841f1f3b76b3121acd85c33ad827ff80e04dccf2752f1649ae36c03c86777b6c26b7a850682133c49c1a209040007510af9589c531cbb6a99e94d64200ca65614db1d688f0ea1efcfa8c68ed7734a2670f0b5a1ab731ba86f82c31a9e200857979be8386c1cb9025713e6b4fd227db113fcfdf9d97abdf87f8841298074094442d9271cd2b9ff8c352422e0ad56574451f28e387fd9d969c9b6ba6aaf8f4f0eb886f44537d9dbfe96f63c5dcc26dd2e06c594706c5aec19be359415e1d74e4218c2c449054290c18cc8e837fd910f93598ae9bdf2b8592780ece2f5828c65e54e0b1661b21cb22d23d20e6b30b145eaf0de0fa04d851944b2fdc71053be04e62872ed5d11f2f33b5dacb38ce1c80ef359a533443978afb5c722c4402f2d7233ba67152b75c88911de7f71445dcc3a70dfcd11c78a1ae27c4b387c7a7a1221609bc47c95e333126473eb0616a750d957f186bb2649ddf733000769ddc0190420ffb8838b9cbbc4b80e4f5b4073b00dd07f9a97a569dde720295bd5df5969032ec83ffec904e423ce4eb438313e6de6b156289b858fca85d7560cb1316f61aeadf7db08fbea47850be7a38007153d333db6bec999fa676d052429bfd1c20ee44a082be133ab67ff51a6465e350bfe6eed24229b8003172776399c671f0c013204166f3ac5271575e9c8384ecad2e5089e45fe8060d8cd26b939b8c6c859cd3ac696bcc04ac9cf2e3950274cd13b6da3f7ff36c87a065d6082f403203daa24a8db120dad952201347a53d97bf5cccddb95e4ec67b1c66a5c98f164878b48e3b62d032d1f8fed773e322b278dbb6efda3b0e81640a3d9aeeefb9fc467a1bf53ff21a9f37a62918b0fa41b6c4b076040011225dc87baee9e205fab6a4313a7fb66d04bfa1fae278d0a20e1db54e9df50ca1e2810cc41d5c05ebdb78c18584dd4b3fb8c73911a8431ba45802c9b88b4a9882faead7cb47f05efe49ebabe2e272d84dad9aee725b6a369c4191aeebd043fc008470615caae69606ed9f77fdeb90542a1b65b4f6e49f2935c9a6c7d1465535593f6a4a7ba9ef07f4fa08292fe5a11e3b1253a43b83aa4cbcdbf760692ff36fb318c2b2d2ca5b5e8ec7ee44d3ea889afbccab37fcdbc972efd4bdc3b2dceb9b802660bbb904d8b38c56736cf0e7232b329910b4e19de7887806b0fdfb83c8edeb70b12dd6d0506cbf13fe237e16963d3cc23d5635296ccea3ca853414969ce4748c6dd37a3eb3130d6c6efac6a34d283bb894af80d7367bffecf1cbea0efd26c46ad6db199b909f955695e55cefc00b165d294b6bf84f834c298cda2cfb9173cb5823799eaf88b74ca4cea0a6ba1c8da87d83239196033bdee23e9fb31de34fe0465614451039dd3931feeea4826175e883835cf2abed227bf131238ae4c9fc6a8da51e0cf38cfd9f9695badec7614014d6f0f90920223fc66e33089b83b9d5faa7ffec43e1fa7a9efe76f57c8a1e370f36d7d6ed89495179f22cd29493d0766d3ef564382e4e41d6899b2eb473f00bdde61a0d0e2a5c375010db60191e37ac0f918216c16e70531c13931d8297567456563cb6da73c33301c188cb3734f0d6bd302ec4f79a0074fde4fd890fb6e12996956747269b52fbb84a042d5792810686897e0fcce67d000b16356a7f784a60f7f73bcfdaf00f74c148ce709b4ccafb1a97c1338806e63f3c497006f5213a838e6b8fcaa2b66082f802697f16aaba2eb00545fed17a790936958770da33d450539fe850f7bde1dceb56e64c8c998e02576a9047794fb0d8fef4b3b7a7682f09b432c6b7c74f0f3055a25f4e46295fe33bffadbb41f97e2089b11a15eb0d5c068294967247ae1897bc30ad62c6c0861ebb80983380d31f4f3f196a2abd25e7fb92d3f2ec48d858840b7c506c750aa8494b473196b6fd32503159390a45bb3d73bf6235bd9a6cba2c2e1474fc4c75070a8d19090f8035d151faf0055bb5bfcfeca268682aa0c00df049bba7af66fa52614ff650214bff4fde512cb7f4157abdb3a0973e60acb36ff506bb1330ed476535d0a924119f2a5dce87bf6b4d87318a07bd57eef65df5d48a09c27e849d9206ae10fc3e0a0856c96def67fd2f2264d2f5e644b5c5d608f578f52760717fd75999ba2a7b01ec875d7732813b433c4ca5a45f80b5fb3fc9d2fc028acee0b238dbfb61d8ab64674f065bd52343060862b60761be223f5244355d03c750ce33ce5d3d4cd9a8dc82818b51c8bb1f52e427356fa23edc8ade6ef69b41703cf40e8721518838f1ffdfd5d5f81ba0362f33d64abd203b413ab6d93df8bf6561d58efe90371abe4f789f95e6592ba509f0866bad174064eff699c9874a4427c29aee86363c2b98cda059ee01e379e5ea5c2357052f486a035f4ba836a0ee2c8cd1134c27cd4422aeffcf1c068c099ad896c844bcbc8b0d5fff85635e5e8f108ba38178084738eb1ce5915e69d26e074c8d3b7ebb9c43784365a65b5181b7f39454c2a36b597e645481ac5308008f2a92e0eac9385190f5f956f2fbfc1ebf01f2d78f0747bf3c21b43d0126080f457290c401edbc6a66f1a34e1bc7d2ff5d3ea259b0c291660da6bcf4b9cb4e6bf38a382a01081eb1dd352a9f99635d76a7af07abec72298dda328656da8e46f48ff528e45d3e90d6834fefb94fee052a9b7bee7c5893ba86bccdf7823335f9c6aada7a4ce2ea0513ccb1309727b82ca38ad808d0b10d896897d89870c9b919c663ae5180bfd681c8101e841578b2730c5fca516066cba051767900ba5c7ef868f92837d18c51c0e62f7ae0486c8a4935a07d96250bcf4f4ad5951cdf3456b5594f956b41625165abb0a016bca59f4eb38e16b7b2888ee00b9294998f64f639a2ae6fe8a9ce80570bf0bdc501341c490fbca35b7f284ffe09fab50799814fc984de2b4e7909190e04172a181233d6b112d2c4f72e56079bcd66a5fcaca5e434c1665a6ec5be82b877aac26c92fcaf44449354fbb7025ba1d8db59361627f6db90f8e3f344f79117880e8f2dc620ad8b487e5dd5da1c3939f2af2fb35608554adb4ede81f7df0e9b1b44df0c49c76993fc8efba8ae1a402751ed748db319b209f55ea92becf7e77c2ca7746376debf545b36a0a35f07e0270a00011e64ea4eaa8ead95f98536b189c18cb8b3b6939a77b8cd5bfec5d01d88dba47ff380dd52e374dbaa6e1d90b8e790aec58bb5a9bca1fa80112f5ac7988e90437d416faba782c8987873da098ebd297596f3e5379b9728cf3a40fbf6", 0x1000}, {&(0x7f00000000c0)="2e9ebc941e3ba852a9953923c4e40c8a1659b48cfcdfae589469ced0f1116147f0330faa709ca820191e5133ad11a4df45a90ba307f666ecb5fbaf306829dc37dcff4319e604b0d46f2534e5813bad32ced4af291124159a92eabb834b3f5153aac3cd2fed28bcd1bb0f21d7c7d9a3a0e3527ece1ddb55a719f13831b97074a8c201d3c61515d58686c726aab739f10586181427177629b1a46654", 0x9b}, {&(0x7f0000000180)="74565e2dcb3e0525b4e3505e84009d97b6ab59f0ba6d53f07945099b115118f1", 0x20}], 0x4) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x83) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:50 executing program 4: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r5}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) [ 253.302432][T10579] IPVS: ftp: loaded support on port[0] = 21 09:12:52 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f0000000000)={{0x3, @name="a60389ee56c4eabb989e0f75079e7bf0b4b89bb8f6668a12341f0908be49e9ff"}, 0x8, 0x9, 0x1}) 09:12:52 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x83) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc01cf509, &(0x7f0000000200)={0xffffffffffffffff, 0x8, 0x4, 0xffffffff}) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f00000002c0)={0x3, 0x1, [0x5, 0x5, 0x366, 0x4, 0x5, 0x4, 0x5, 0x6]}) r4 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4840, 0x0) r5 = openat$mice(0xffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x400800) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r6, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x240080c4}, 0x4000840) tkill(r0, 0x3c) r7 = inotify_init1(0x0) fcntl$dupfd(r7, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r8, r9, 0x0, 0x4000000000dc) fcntl$getownex(r9, 0x10, &(0x7f0000000000)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 253.711941][T10579] chnl_net:caif_netlink_parms(): no params data found 09:12:52 executing program 1: clone(0x2008702d7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) mknod(&(0x7f0000000080)='./file0\x00', 0x20, 0x9) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={r3, 0x9, 0x0, 0xfffffff9}, &(0x7f0000000040)=0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:52 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$SNDRV_PCM_IOCTL_PREPARE(r4, 0x4140, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x50, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000814}, 0x840) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() tkill(r6, 0x3c) r7 = inotify_init1(0x0) fcntl$dupfd(r7, 0x0, r7) openat2$dir(0xffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x101000, 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) fcntl$getownex(r4, 0x10, &(0x7f0000000180)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:53 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) [ 254.313718][T10579] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.321077][T10579] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.330705][T10579] device bridge_slave_0 entered promiscuous mode 09:12:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000080)=0x1) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) ioctl$KVM_SIGNAL_MSI(r7, 0x4020aea5, &(0x7f0000000000)={0x100000, 0x5000, 0x7a, 0x80000000, 0x4}) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x800000, 0x6, &(0x7f00007fb000/0x800000)=nil) 09:12:53 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x0, "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"}) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 254.447147][T10579] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.454585][T10579] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.464332][T10579] device bridge_slave_1 entered promiscuous mode 09:12:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x301040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="180100001e00000826bd7000fddbdf2507000000", @ANYRES16=r5, @ANYBLOB="0020000000000200d8001a8004000700040007000400070074000a800500080003000000050008001000000005000800ff00000014000700fe880000000000000000000000000001050008000200000014000700ff01000000000000000000000000000114000700ff01000000000000000000000000000114000700000000000000000000000000000000000400070030000a80050008000800000014000700fc02000000000000000000000000000005000800010000000100080000000000200002801c00018008000a00060000000800140007000000080006000500000e2000198014000500e596e69a6039828ab8c33ca62234616c050006003f000000076b22e67e366838d72bc5fabe6f9e6843cf8fed109c362a8f0d916af2483cf08d5d0fb5e28c796c0879cdeec65bb47196b0c4b870338c79ff0fc8f9d634f7fc60a61e9dbef9727941c9a055a45c1b76c5b03cc396b6c49a3444f0437506572929f2cd6efff7e16b1879eca5825dbe49b890237377a4b67b22e89243b5dbf8e050815d00de62ea913aa772d678eb38f169a91f55f861564188c546cc6925adbd0804dc1aa48f84cf16f0978191ebcfad34982df9262c98c31b74c4c4ba98aa5db5ed5806a80b6607588742d8130066db63b90492a866e2cc1cb66cbfac1e6e5c844f0a0f95044aad35b331fb80e1dc2b3948a67038d4b8e5d0a0c2cdc4708870102cc165da7c58ec706c99c2ba1f8b58cb02a13d8478d63cf35eb0b1320a3b4c6a716e68f08d0cf87a27306eca0325585e1e653e2385d63f80181d44078d19e24b98d02d0b22437e6620645614f6346323d20de86b663eb03e844aa400b3fdfbe5a7a4aee983f43154fe8ac61ddfe0b6f01ce6276cf46ce13cd1126bae2afc91ec907199fa3c92ac3cd09df03b7cc8092b0c46fab7656c683b5185dcfc31dfd9bcdc2e8fe63e9698825210ee3b163750a34c4572fedcb2ad0be219fce95bfd66a0"], 0x118}, 0x1, 0x0, 0x0, 0x20008840}, 0x20000080) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 254.675631][T10579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.741353][T10579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.004767][T10579] team0: Port device team_slave_0 added [ 255.059126][T10579] team0: Port device team_slave_1 added [ 255.182296][T10579] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.189368][T10579] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.215672][T10579] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.310318][T10579] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.317446][T10579] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.343599][T10579] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.531210][T10579] device hsr_slave_0 entered promiscuous mode [ 255.571092][T10579] device hsr_slave_1 entered promiscuous mode [ 255.606941][T10579] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.614742][T10579] Cannot create hsr debugfs directory [ 256.054831][T10579] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 256.128337][T10579] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 256.187076][T10579] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 256.263198][T10579] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 256.633931][T10579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.687640][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.696883][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.717639][T10579] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.751731][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.761476][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.771783][ T3067] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.778989][ T3067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.833443][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.866643][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.876780][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.886078][ T3603] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.893418][ T3603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.953151][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.964315][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.974909][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.985235][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.995300][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.005663][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.015911][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.025322][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.058950][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.068602][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.078293][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.095676][T10579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.186246][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.194481][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.221151][T10579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.405261][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.415411][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.473151][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.482866][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.502318][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.511544][ T3067] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.533059][T10579] device veth0_vlan entered promiscuous mode [ 257.565306][T10579] device veth1_vlan entered promiscuous mode [ 257.631291][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.641051][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.650511][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.660438][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.677884][T10579] device veth0_macvtap entered promiscuous mode [ 257.700446][T10579] device veth1_macvtap entered promiscuous mode [ 257.721256][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.731302][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.754953][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.765616][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.776112][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.786661][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.796686][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.807303][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.817345][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.827951][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.842065][T10579] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.857379][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.867423][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.889179][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.900161][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.910245][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.920893][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.930956][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.941602][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.951625][T10579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.962283][T10579] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.976252][T10579] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.988283][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.999147][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:12:57 executing program 4: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:12:57 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:57 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:12:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x101, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc00c64b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], 0x2}) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000000c0)={r1, 0x8, 0x81, 0x7cb, 0x6, 0x5, 0x8, 0x4, 0x5, 0x2, 0x81, 0x8000}) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f0000000100)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x4000, 0x7, &(0x7f0000ffb000/0x4000)=nil) 09:12:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '\x00'}) tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) 09:12:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x4, @any, 0x101}, 0xe) 09:12:57 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f00007fb000/0x800000)=nil) 09:12:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:12:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000001300)={0x5, 0x10, 0xfa00, {&(0x7f0000001080), 0xffffffffffffffff, 0x1}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000001040)={0x5, 0x1f, 0x101, 0x6, 0x18, "ebfaba6b83ebf0334f067f065b5d3740d5d9db"}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) ioctl$BLKALIGNOFF(r8, 0x127a, &(0x7f0000001000)) sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r6, 0x80dc5521, &(0x7f0000000000)=""/4096) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:58 executing program 4: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000000)="5f688282636a189ac31206afd870b888", 0x10) 09:12:58 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f00007fb000/0x800000)=nil) 09:12:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80206433, &(0x7f0000000040)=""/92) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) prctl$PR_GET_SECUREBITS(0x1b) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000040)={{0x2, 0x0, @identifier="a96e0503ee858fb4ceebef5649fe8056"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f00000000c0)={0x1, 0xcd, "c9859703f9374f3957dba5e1b3cbd523750d506c14c8ccf398ef8d6033dea9583bd24033a9d230301853aff06f6c5429d17404a80ec5e0030e96a2c36d9a560e08d345f365fa23bf7ed818a7583fc63ca089e90e94a3fa0467fab42812d697670dc53c13433e547043a678b2e8f10b5119d9d26c93267807ef48b9e5bd18fa251da9252d0cf30f34036d42af6b10548d5f2204c1c1d78d3327fbf4d885a1a34c586ed264d8db22458c00a31ec1c2638ba799650d1b86fe3bf3d5cedf0d58685d264b5d1c0197d9a307bac05dc5"}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000000)={0x1, 0x0, 0x100e, 0xfffffff8, 0x2, {0x6, 0x1}, 0x1}) 09:12:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000000)="5f688282636a189ac31206afd870b888", 0x10) 09:12:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x4000000000dc) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000)={'veth0_to_team', 0x32, 0x30}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast2, @loopback}, &(0x7f0000000400)=0xc) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000080)="ac58124775b04cfeae5330fc4f9a6c67358fceb0eec67298619244e46eacdd03b853db9df4d25f8e21b9bd7797538d2f8519725879078e81f6c1f6233a07a04c067e17fed5b3e89d05c1c4bffbbc77588b8c82cf96aac901a9b4b6523f5bf11de3ef0aabbb23e8aca5b3cef03661a2c7e8d1398f4be0ea12574c5497c41207ca5b1c41263bb33ac989ba05f554f51603cc826015f18aa499e88266bb80f3fe454d3a2c828a82c144548245c648506d7f56af01b8d091a3be6b96ae9da9c29dcca4f14baf65cee7a12863fc30a34587e3d2a47afdbef1dbe81ce2c5d901b6936bb24356ae49e1d617c0", 0xe9}, {&(0x7f0000000180)="36cfc3199f6ea60c01c6cb7acc63100cc7b4772a90930550d48ede12e2375155a6769af334514814be9c621ba7a1688086c52ff774f1baaf4e41faa5dd880c683fe1e02aa35299a86559e0ea79f0145de59449287e9eb8debf8de8cf0fda7d10b9180c11b2c31815bb771d8e77105854a777fc9ff91607cdd195b6d2fd4256532bfd2191f92979dd4c0a79ca6bfa8269fdaf25272c4a0b3ffd52f0f430ba", 0x9e}, {&(0x7f0000000240)="b0112a505eda0930b7bcd4303372f3647928d98b8a86b97e9978f73403ed44a15d4469796cc7827ba9fa5986cc7a41665a832259dd557a86289801a15915028328db8fcd0dd570706e10d153b06357c2a80b9a39361f2663299e55d5c937b0c4dfbc12cb67d3b149d6e260bc94f515b35980a4a74d1313cffdadcae6cc9f14cc810f5c96ef9a031c4672b53d088a7c945fd836f9ec70fdb182e4f4f5176806bd09b87f184fcf948c71292e7ad32a461c9a53eb646e67230c25463fac7224e93d94900443978d5ffc5117a601a84d4452c401b969c40b8ec60776cbe1a70da8ee13de322ec8c7f693432e18644126", 0xee}, {&(0x7f0000000340)="00dae4d4c66db0ab99", 0x9}], 0x4, &(0x7f0000000440)}, 0x4800) tkill(r0, 0x3c) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:12:58 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) mremap(&(0x7f00009df000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f00007fb000/0x800000)=nil) 09:12:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) open$dir(&(0x7f0000000040)='./file0\x00', 0x101004, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') fcntl$getownex(r6, 0x10, &(0x7f0000000080)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000000)) 09:12:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) dup(r3) 09:12:59 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000000)="5f688282636a189ac31206afd870b888", 0x10) 09:12:59 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:12:59 executing program 0: r0 = gettid() tkill(r0, 0x3c) inotify_init1(0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = getpid() setpriority(0x0, r2, 0x0) setpgid(r2, r0) r3 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:12:59 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:12:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000000)="5f688282636a189ac31206afd870b888", 0x10) 09:13:00 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) fdatasync(r0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') 09:13:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = getpid() setpriority(0x0, r3, 0x0) ptrace$poke(0x5, r3, &(0x7f0000000000), 0x9) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) getsockopt$PNPIPE_HANDLE(r5, 0x113, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') 09:13:00 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() setpriority(0x0, r1, 0x0) ptrace$cont(0x20, r1, 0x8b, 0x7268) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$RTC_UIE_OFF(r3, 0x7004) tkill(r0, 0x3c) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r7, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}]}]}, 0x20}}, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000000c0)=0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r7, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x10) 09:13:00 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:13:00 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0185649, &(0x7f0000000080)={0x9c0000, 0x800, 0x9, r1, 0x0, &(0x7f0000000000)={0xa30903, 0xffff, [], @value64=0x100}}) write$proc_mixer(r2, &(0x7f00000000c0)=[{'IMIX', @val={' \'', 'Capture Volume', '\' '}}, {'VOLUME', @void}, {'RECLEV', @void}, {'DIGITAL3', @val={' \'', 'Synth Capture Switch', '\' '}}, {'DIGITAL1', @void}, {'RECLEV', @void}], 0x7e) r3 = gettid() tkill(r3, 0x40) r4 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)=0x1) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) r9 = fcntl$dupfd(r8, 0x406, r4) fcntl$getownex(r9, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) r6 = accept4$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x0) fcntl$dupfd(r6, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') fcntl$getownex(r7, 0x10, &(0x7f00000001c0)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r8, r9, 0x0, 0x4000000000dc) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x2, 0x10000, "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", 0x1f, 0x1f, 0xa4, 0xbb, 0xfa, 0x5, 0x40}}}, 0x120) 09:13:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) 09:13:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000100)={{0x2, 0x4e24, @remote}, {0x1, @multicast}, 0x62, {0x2, 0x4e21, @rand_addr=0x64010100}, 'syzkaller0\x00'}) r4 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter6\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$VIDIOC_S_JPEGCOMP(r6, 0x408c563e, &(0x7f0000000000)={0x6, 0x1, 0x8, "69df86f4e41f3e64839eb20470f544b129d88d1467e35fb5b6f8daf65aea0364566d00190000000043295aae1cab1e00", 0x14, "86f5ee551515ce131072b3a47a0504306cb81ea3e36c0c14704ee6d8da44bd0c0858f56bbd77296aea0fa99271640e52413016856a61998c044d7896", 0x18}) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYBLOB="7a0000006aabce5ee280d0c5fb71ba9c974b3f94e233ebfd740e4448ddce6f43b1be0aa29c271268b0557e3ebcc03978dc90af5757212517a9100c4a606e18bb006a48a30df38e8c444bded45a250aded3e98989e352da1724219c7349bb85550eeebce06126c82c95ef7aefa36b6904ef0c8ecfded8f67d61a19532b12de100a100"/139], &(0x7f0000000100)=0x82) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140)={r6, 0x100}, 0x8) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x401) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() tkill(r7, 0x3c) r8 = inotify_init1(0x0) r9 = fcntl$dupfd(r8, 0x0, r8) fcntl$getownex(r9, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:01 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) socket$inet_udplite(0x2, 0x2, 0x88) 09:13:01 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) mq_unlink(&(0x7f00000000c0)='#^\\.&\xcf%K\x00') r1 = inotify_init1(0x800) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200400, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000000c0)={{0x84, @loopback, 0x4e24, 0x3, 'none\x00', 0x2d, 0x6, 0x6f}, {@multicast1, 0x4e21, 0x0, 0x9, 0x7}}, 0x44) tkill(r0, 0x3c) openat$nvram(0xffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0xc06c0, 0x0) r2 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r6, 0x81, 0x8000}, &(0x7f00000001c0)=0xc) r7 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0xc0605345, &(0x7f0000000000)={0x4, 0x1, {0xfffffffffffffffe, 0x0, 0x8, 0x0, 0x400000}, 0x80000}) 09:13:01 executing program 0: clone(0x20000044f7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 09:13:02 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:02 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) socket$inet_udplite(0x2, 0x2, 0x88) 09:13:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x800) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:02 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000000)='net_prio.ifpriomap\x00', 0x2, 0x0) 09:13:02 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r3}}]}) 09:13:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x203, 0x0, 0x0, {{}, {0x0, 0x4101}}}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r5, 0x100, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x7fffffff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc854}, 0x3004c010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000180)=""/165) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r8, 0x0, 0x4000000000dc) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) sendmsg$SMC_PNETID_FLUSH(r8, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x94, 0x0, 0x301, 0x70bd28, 0x25dfdbfc, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'sit0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6_vti0\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0xc0}, 0x24000000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:02 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:03 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) 09:13:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r5 = getpid() setpriority(0x0, r5, 0x0) ptrace$cont(0x1f, r5, 0x5, 0x0) sendto$inet6(r2, &(0x7f0000000080)="a156080c0eebc41c6824743d70664f799ff5a7", 0x13, 0x4c800, &(0x7f00000000c0)={0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) sendfile(r3, r4, 0x0, 0x4000000000dc) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 09:13:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:03 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:03 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) openat$6lowpan_control(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 09:13:03 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 09:13:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) 09:13:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) setsockopt$inet6_int(r3, 0x29, 0x21, &(0x7f0000000000)=0x8, 0x4) 09:13:03 executing program 1: clone(0x200d2201dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000000)) tkill(0x0, 0x3c) r2 = inotify_init1(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffeb1, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="1100cadea215ed1baaef02000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf0, r4, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x80}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x3}}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x91}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x80, 0xac, "0264aa482b5a5fdb8f8f393147dd4f4185336c95b5a0d8fe95b9f9bf39f9f34b067db7aa6fa31267aa97bc783bc277a5a2e4eed570759a4d504ab357062394e6f8e8993ea34bb1e098f214b0238c33a030daedf9ef48d060fe8ba26452e7e57fa0f8881d157d6101ce49a924d13eecd511cee88afbaf5cd9a60c9fb2"}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x8, 0x414, 0xfff]}, @NL80211_ATTR_STA_WME={0x14, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1}]}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x31a, 0x8}}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xb, 0xac, "87dc0fe8984680"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r6 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4068aea3, &(0x7f0000000200)={0x0, 0x0, [0x1, 0x38d, 0x80]}) 09:13:03 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = getpid() setpriority(0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) sendmsg$AUDIT_SET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x3e9, 0x200, 0x70bd2d, 0x25dfdbfd, {0x0, 0x1, 0x0, r0, 0xfffff6e7, 0x0, 0x9, 0x5, 0x0, 0x5}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ptrace$setopts(0x4200, r2, 0x5, 0x100000) r5 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 265.138491][T11234] IPVS: ftp: loaded support on port[0] = 21 [ 265.154252][ T32] audit: type=1400 audit(1595409183.979:9): avc: denied { sys_admin } for pid=11232 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 09:13:04 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) socket$inet_udplite(0x2, 0x2, 0x88) 09:13:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f0000000040)) [ 265.360863][T11234] IPVS: ftp: loaded support on port[0] = 21 [ 265.456591][ T615] tipc: TX() has been purged, node left! 09:13:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x5, @perf_bp={0x0}, 0x1000, 0x3, 0x0, 0x9}, 0x0, 0xe, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000002c0)={0x3, &(0x7f00000000c0)=[{0x2, 0x43, 0x81, 0x7}, {0x2, 0x7, 0xf8, 0x1}, {0x7f, 0x1, 0x5, 0x3b}]}) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) dup(0xffffffffffffffff) open(&(0x7f0000000240)='./bus/file0\x00', 0x20a000, 0x60) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000003c0)=0xd610, 0xfdd8) dup(0xffffffffffffffff) unshare(0x8000400) r1 = mq_open(&(0x7f0000000100)='s\x8f1^g\x80\x12#\xd8=K\xa6\xbb\xdd\xe9\xae\xbb\xb2u3\x96\x1d\x9e.\x81\xe2\x12\xf3U\x18\xf58\x1dd\xee;-R\xc4h\x99\xbf6\x85<%\xdeD,\x0eET\xe25\xb7\x9a\xfcCHQ\xe7\x92m\xd1KH\xff\x16\xfa*\xbc\xd3\x1a\x04\xe39,\tt\"\xd7J\xf3\x8d\xbb\xd6\x8fB\xc6\xa8\xb1)\xee\x80', 0x6e93ebbbcc0884ee, 0xa2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mq_getsetattr(r1, 0x0, &(0x7f0000000180)) tkill(r0, 0x3c) r2 = inotify_init1(0x0) fcntl$dupfd(r2, 0x0, r2) 09:13:04 executing program 1: r0 = openat$zero(0xffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000080)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x56}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 09:13:04 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) fcntl$dupfd(r6, 0x0, r6) 09:13:04 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:04 executing program 1: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140), 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f000047e000/0x1000)=nil, &(0x7f0000ad6000/0x3000)=nil, &(0x7f0000ff0000/0xe000)=nil, &(0x7f0000ca8000/0x3000)=nil, &(0x7f0000af3000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00005ec000/0x1000)=nil, &(0x7f00008aa000/0x4000)=nil, &(0x7f0000000000)="f908471190ea069cbf6639b9715443ac149fb49f75789afb02318469347ecb38b463e20783f74f415894bf719ad2f22c9601564ee1e8e97ef334d9f2f00ec73b44e66f6e255775497a83007a0e0a6866376abd37452ce1889846aa7dd981f30f6bfe89dd9eb1bd817bd9d13bab9a0ea3a4764d3dc0a0df8e4b126257d7361bcb422421e8c21c0ad609f95d930cda4c67a39d7176d6cb421ad09dab5120080bc37fa0a2aad7537072757178f283aeb0ba4b8412c582375b1bdcef", 0xba, r2}, 0x64) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) r6 = inotify_init1(0x0) fcntl$dupfd(r6, 0x0, r6) 09:13:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = fcntl$dupfd(r3, 0x0, r1) accept4$tipc(r4, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:05 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:05 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = fcntl$dupfd(r2, 0x406, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) inotify_init1(0x0) 09:13:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x100c00) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:06 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = open(&(0x7f0000000180)='./file0\x00', 0x200, 0xc8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x10000) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000001c0)={r7, 0x8000, 0x0, 0x7ff, 0xff}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r8, @in6={{0xa, 0x4e20, 0x200, @local, 0x8}}}, 0x84) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r5, &(0x7f0000000100), 0x80000000, 0x0) 09:13:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x19) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0838cbbf6717e51daee65073fc3fc5163a04998eeaa3c260f73ebca0263eb6b0ef98de8bede96c2a716920eb2fdc5914bec17f8e573a3c1cbfdd8169de0bfa1ca3b3873ce7592bc96772f12b2da6e7971306938ca915c74f56155696854e69422122be9248c5889374f687c1b37e99316bc9f681344653be6847f775da34921ba8a6de9973bcba67cf57b7192a054724b07f436597241a6d5ee32b", @ANYRES16=r2, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r4, @ANYBLOB="0800260080090000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="98000000", @ANYRES16=r2, @ANYBLOB="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"], 0x98}, 0x1, 0x0, 0x0, 0x24044080}, 0x400c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$VIDIOC_S_CROP(r6, 0x4014563c, &(0x7f0000000000)={0x2, {0x8, 0x8001, 0x3, 0x1}}) r7 = inotify_init1(0x0) r8 = fcntl$dupfd(r7, 0x0, r7) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_CHANNEL_POLICY(r9, 0x112, 0xa, &(0x7f0000000100)=0x5, &(0x7f0000000140)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:06 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:06 executing program 1: clone(0x20082004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 09:13:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:08 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000080)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000000)={r7, 0x400}, &(0x7f0000000040)=0x8) r8 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r6, @ANYBLOB="20c7"]) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r8}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6, r4}, {0x8, 0x2, r6}, {0x8, 0x3, r8}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc, 0x80000000}, 0xc, &(0x7f0000000300)=[{&(0x7f0000000040)={0x2c0, 0x1f, 0x400, 0x70bd2a, 0x25dfdbff, "", [@nested={0x2ad, 0x3c, 0x0, 0x1, [@generic="9b3889abd8b4ef2d6cb0271295b26bb61d30c9", @generic="7206e3a44f0dc01fcba26d4dc593201967854e6096c8303f9012da378d55130754525ff8a73907a3b3df7d427088afef393e646996e88626df7bff13ec6c97fdb8246897dd732a6a17380312300231c85b6ffc24b094a7bb7892fbd8621922845ba66f982b271a887cffc5c9df01b127d1ad5b71594f7058859feaf09bace0fd62f6ce555d242c5dec1a092172131002dbe9b6fc28230f3ef2c7a97bc7562f95682134c9ca24782d5985a4cc4a3d8c56e025bf5ad1516e9c6f4d4526a46292ed0c79482c9dcf1ebd57d4c03a6f74bbe5bfd66cb1a2329e83c8f8dfc30e7057a4415b0b5012336bd694481c4ef0541d99e06b146206", @typed={0x8, 0x5f, 0x0, 0x0, @u32=0x7ff}, @generic="b5666811a065a1f956bf6216e2531a6a322b8df2cb10924576efd3f3a21997e95a8d8d1398897ff1e5702c80e2983cde3348616f1e2a017dfcf781d460", @typed={0xd2, 0x87, 0x0, 0x0, @binary="deb0a14f4c85ede4829049a4711dde3fa06630f480cb3c967a822065b2190e34e7ebe160b8e182669a3c0d34e1549e06e03f4334513ba221fa9720735279e4791476560915e9da487f0c6d41c6613934dc3a3ffe2fcd466cf421c4382065b181e499467929baba33fbf0635d3e3cd54d78be6a30789e06e89451926a3a6fed5bccbb031dd8cac18369a276b21a4f08d6cf0dfb586a46de9650fd090f336e9db1a8d48e7db494b3e40c52106ceabe8b8cdb3b2dd59c8dd1093d25bc02e0cad5b5bbe72c3776963f892638b1583ffb"}, @generic="9537c548e424561a2871a8c134a0026ff35ceb6b8c4f2d6d271fc969e9f6e91e7dbdf6337567de21155f4b96b2a40e8d3340172a2ff374172af6dfca732ebd626f17285a32482369bdd9a32c9f372e613410de17cd08d8336c066b6d2c8e25e8036bc1ffa80ac5bd241b93036f7728ca5a31b6a134e704b7710a9d4d10f2e980742d22de5baf0f9e"]}]}, 0x2c0}], 0x1, &(0x7f0000000340)=[@cred={{0x18, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x18, 0x1}, 0x20000000) 09:13:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:08 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_CAP_AMBIENT(0x2f, 0x6, 0x10) tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 269.559714][ T615] tipc: TX() has been purged, node left! [ 269.580705][T11405] IPVS: ftp: loaded support on port[0] = 21 09:13:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) [ 269.857673][T11422] jfs: Unrecognized mount option "gid=0x00000000ffffffff Ç" or missing value 09:13:08 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) [ 270.400061][T11405] chnl_net:caif_netlink_parms(): no params data found [ 270.841972][T11405] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.849351][T11405] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.859056][T11405] device bridge_slave_0 entered promiscuous mode [ 270.883561][T11405] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.891042][T11405] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.900926][T11405] device bridge_slave_1 entered promiscuous mode [ 270.965803][T11405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.021897][T11405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.155714][T11405] team0: Port device team_slave_0 added [ 271.182042][T11405] team0: Port device team_slave_1 added [ 271.283115][T11405] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 271.291122][T11405] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.318235][T11405] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 271.342943][T11405] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 271.350169][T11405] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.376582][T11405] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 271.568093][T11405] device hsr_slave_0 entered promiscuous mode [ 271.599698][T11405] device hsr_slave_1 entered promiscuous mode [ 271.634097][T11405] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 271.642281][T11405] Cannot create hsr debugfs directory [ 272.042035][T11405] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 272.086058][T11405] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 272.147577][T11405] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 272.215429][T11405] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 272.375853][T11405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.395257][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.403727][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.426000][T11405] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.439084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.449005][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.458405][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.465717][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.510086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.518591][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.528522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.538205][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.545681][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.554166][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.565044][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.575045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.585441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.595774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.606105][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.615807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.625336][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.644222][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.653840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.663479][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.679029][T11405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.714465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.722396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.744159][T11405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.841317][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.850696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.894762][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.904980][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.921425][T11405] device veth0_vlan entered promiscuous mode [ 272.934224][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.943043][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.965217][T11405] device veth1_vlan entered promiscuous mode [ 273.008821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.018416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.027910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.037664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.062814][T11405] device veth0_macvtap entered promiscuous mode [ 273.078683][T11405] device veth1_macvtap entered promiscuous mode [ 273.111702][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.122484][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.132507][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.143159][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.153227][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.163826][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.173826][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.184407][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.194441][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.205021][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.217531][T11405] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.226024][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.235566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.244545][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.254437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.277032][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.288106][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.298126][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.308639][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.318635][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.329176][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.339129][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.349638][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.359571][T11405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.370083][T11405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.383807][T11405] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.395337][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.405829][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:13:12 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0185649, &(0x7f0000000080)={0x0, 0x1b0, 0x1, r1, 0x0, &(0x7f0000000040)={0x9909e3, 0x16b, [], @p_u32}}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r3 = gettid() tkill(r3, 0x3c) r4 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x30, r7, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_DOMAIN={0xa, 0x1, '^{:..\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0xc8c4}, 0x20004091) r8 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x2000, 0x3, &(0x7f0000ccb000/0x2000)=nil) 09:13:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:12 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e22, 0x1ff, @local, 0x20}, {0xa, 0x4e24, 0xfff, @mcast2, 0xffff0000}, 0x800, [0x40000000, 0x401, 0x7, 0x2, 0xfff, 0x100, 0x3, 0x9]}, 0x5c) 09:13:12 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:12 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2a) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:12 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r5, 0x2ca, 0x1, 0x1, 0x7, 0x7}, 0x14) r6 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) sendmsg$netlink(r8, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)={0x50, 0x40, 0x200, 0x70bd25, 0x25dfdbfe, "", [@typed={0x3f, 0x48, 0x0, 0x0, @binary="4d3d48f0733bc334113603998f9f29a1b638cbba833cbeb2dc3762723e0a5cb274ef8494e265d71f1ce21ada86111eab7b787e0ef94b5f27ce0ce7"}]}, 0x50}, {&(0x7f0000000100)={0xd8, 0x33, 0x20, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x14, 0x76, 0x0, 0x0, @ipv6=@empty}, @generic="750c582f3f118535893410b3372af43cc62d930176b0d320e3d9df44cab2ceadba4d41add3768257adb7690862d85ce3e2c67ae568618c3209070abdef3e00e367b0a22c", @generic="7f4dae3dea155c3dcf177373f764fcf4352f17c96b105ad261c18bfe0b2ac39c2e31077717ab8052360810cdfc8b29b3a7bfd605374dc15c64dc024a4a8985b035a7cf3d23f20a89f66ceb6d585271c15387a9e8562fd6d701397cebefdf1ca5e2229c", @typed={0xc, 0x41, 0x0, 0x0, @u64=0x4}]}, 0xd8}, {&(0x7f0000000200)={0x454, 0x34, 0x400, 0x70bd29, 0x25dfdbfc, "", [@typed={0x7, 0x6a, 0x0, 0x0, @str='([\x00'}, @typed={0x8, 0x5a, 0x0, 0x0, @u32=0xfffffffd}, @generic="254a919880857ee55836ce8b5a0bbc65b032a75d31fa6d49b58cd192a3f7952e8ca1dc7395a0ca996b0d55b3d5a0d8559962066c03955898c1d9522ab724ea3c8d29355d92a5606672941c6e4873bf", @nested={0xa6, 0x49, 0x0, 0x1, [@typed={0x8, 0x3b, 0x0, 0x0, @u32=0x2}, @generic="957c7de5fec9f9feb46a27512db6d9ac91166597674cd965fa661de1c9db430fb8ccdddd9782e31e3fff6b9296ebfe7a61d3835cbe994534a0c7f3da3299023446129831ec46e465588dfaf82929ff15084d15dee9438dfdfc14d46998355121858569f9db8f6ae40d0f9bf1d623a062fba1b206e9260541e4641cafa24e9faa145870f5ca57b070d6bb61dcbc293d70f819fb57f5b3f3581593"]}, @generic="edf33b3fa9de74fd58a59bc87210549c79b637de2f40a1a890223b559dc44252c29eecd72b2ecd9cf08c9d735ce8be84c3", @nested={0x16a, 0x61, 0x0, 0x1, [@generic="46c86d901cbe3dd6a241dffbcd7617dab2be801734ebe7cae421f272e079783af03d8540435b7f5e1fe70864a273d2193a54e2be2bb9744c51ab6cd430b30612bc8e58904bffc9d90b6e0170dad108db2777696f090e8be5636bed3c56a7f328cd92d4477bc1ba8e7b64b8915eeb8c6c64f5d111a45bafe21297600412a3a97c361e181b116a13f635bcd3190cb75a92b6fd88cfb38361409f8cdd4cbfe3e0ac97cee60e0a595ae858c88d4c72df7925", @generic="445fd4e6fc929273f26d4943e101d2961a934ee41e2a54ccc09005730dd343e3bf73163a478c9fe44e0ef52956d5ae159258f8a96b3c730fec8e1847ed5f757a205414604154ec96462d212eb836c9e2790ffccfc9788d12ea6dd6c2f8f10d1792dbae56be5b202738319c0171e56f24314adb4818c5516aa8ffb10c1b31856c12e220ce15ffe9807372f827a8ba12aa7c", @generic="78e1aa442ead82debd37a6cbe6b9815d5c7e6cd47405f63f504ee67c15454fbd23a4c5972f"]}, @generic="d4b91607c0bebd00c361b1a8772601e073b70f6d55ae967dbfb132c87d560e4c84b0825e4378f19bdab5e3e7fa6a4b83da656735677f7f9ff76fe3aae15b0e6b5243cca49f8f8820bb677f0ce1ae6bb37cc230a6b84c55208d6c1b964959e94fe77504d6dbe21b3f293559c657949358acdd9b03801e559b3bd5", @nested={0x122, 0x93, 0x0, 0x1, [@generic="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", @generic="aa32e8fab805de2d5a38856a75d76656b2dcee029e090258d692fb4544d1a858"]}]}, 0x454}, {&(0x7f0000001b40)={0x20e4, 0x3c, 0x10, 0x70bd2b, 0x25dfdbfd, "", [@generic="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", @nested={0x1040, 0x63, 0x0, 0x1, [@generic="f14c68784a5787421182a7fcc8113b98ff61d50d69d3555b579648c8946dfabdd92b82be3850bfb153", @generic="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", @generic="13cbdf379210fb44ee05de6239f74b7ac95085"]}, @generic="d233e7abcc051f140dc5772d6791dbb2b6fbc2bc903e1edac501ef910a270cb2670c0d8f51e4debabd9dc769db459b8f15cf064a6137924a00e35680444706973f5c4a1923d14d1888746a4908222e1f8afc0b27c9d57854a18f7d2efd77887d550914aa5b010fd12204aa9aad618c2cdee652094aeb118bc1ad025172e567654f9bbdb1bcb5cf6bcd527d231f3b0739f0785f"]}, 0x20e4}], 0x4, 0x0, 0x0, 0x4804}, 0x80) 09:13:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dlm_control(0xffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f0000000200)={0x4000000a, "d790d730cb03597d5e4ce498822581e1b84d61a7d1c1e3769254795162f0d22afdfc071391558c758522a977ac5584241c4e70ca1374405b762677484c3a9b9215dcd0c61a679a26e73669bc2513c3564da3f20407355cbc5854cd82bac36ff287912410e130bf07918ed6254f822d4ede40597329fa947e8a834f81a1106f8b802593003ceaf126800900000000000000cd200e2ae64d6c5be0155e338571b22649bfce0dfed4ebc3699215f8ac0220b4699cbd89f2de62ee11bffff49abf8803d5e0caf6bbb94062aa4b03e94cff9de7d9e76d3776a6c56ee3e27d2c6c504d920f70e898c6eced0e2900"}) tkill(0x0, 0xa) inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'macvlan0\x00', 0x1}) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000001c0)=0x1120030, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) r6 = fcntl$dupfd(r2, 0x0, r5) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:13 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:13 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:13 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x406, r1) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100, 0x84a02) ioctl$TIOCNXCL(r3, 0x540d) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x1a, 0x4, 0x1) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, r1, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_macvtap\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macvlan1\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000000)=""/62) r0 = gettid() tkill(r0, 0x3b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x2}, &(0x7f00000000c0)=0x28) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) ioprio_set$uid(0x3, r8, 0x4004) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:14 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:14 executing program 0: sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="000225bd7000ff"], 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)=ANY=[@ANYBLOB="0800000201000000"], 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x82, 0x0) ioctl$CHAR_RAW_DISCARD(r1, 0x1277, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000000)) r4 = inotify_init1(0x0) fcntl$dupfd(r4, 0x0, r4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:14 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r2}}]}) 09:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) fcntl$addseals(r2, 0x409, 0x0) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x2000, 0x3, &(0x7f0000758000/0x2000)=nil) 09:13:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="8d7da3e59231131464de3814f27ec2aaf7532f0dd12ff4c748139a9c82dffbe40095bb813537d4b24b891923cbeeb635fc6f76edc20e6d79572a38f873778b16405ec0a554b860ef1613c7668dbd16240c57b790cb1a3b114b0ef0d8c650186abbb86486e6bb5be720e425f264fa811423568a3f7390f9838093eef453e6adb4adbad7314a9c554a4c91dfa08da7382cc64b7960a625f315966566b28e863deadf2a02a817cd6b809b096d12c43b7ebd01889edd53c5a42eb26533984a791592495f4ca77fa283e10cae0dc0792dc2121a27433427b00f67434ac74b91b3cd9523ab66", 0xe3}, {&(0x7f0000000340)="6fb39139f4d8", 0x6}, {&(0x7f0000000380)="69e38ac100571a230c57a124fbdc897d3091bd16cbb8e4eacfb52c1691602006002f52701fcd517d0bf8ed12ccead866cea303002a7b419743bdd9f77ddda33ec61b592def3d85c245b9a111b9e338c9cc", 0x51}, {&(0x7f0000000400)="47feff147cd394b14fba4e5aa97b1abba7e6bd14c28cb3d532627c39d772b4e865306a9faae7355cdadf21030914eb45627cd3b66ef591a73ed860ffc0d69e41bb0210db75edb7582d74ff8d3951cba1920763bbb99b7b14805aa7615a507990d32ec8511e86803ef4554173a82c5e74c86505e34f8c860b99905776efecf677047bd09187ee8a40ca420fee28fcfad7f33f991064e2c4d02dd618a9a1a196c2b54ee90917136f524effd4a54a7c449f4c75a3c50db25568e24ec76e50b128020d342080612effe594dd80091fa71cb91faa", 0xd2}], 0x4, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {r0}}}, @cred={{0x18}}], 0x44, 0x840}, 0x40) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r3 = openat$vcs(0xffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20080, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) ioctl$SIOCAX25GETINFO(r4, 0x89ed, &(0x7f0000000100)) 09:13:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000000)={0xb0, 0x0, 0x8, [{{0x3, 0x1, 0x1c, 0x5, 0x44800000, 0x8, {0x5, 0x1, 0x6, 0x9, 0x3, 0x7, 0x17f0, 0xc3000, 0xff, 0x9, 0x7, r4, 0xee01, 0x4, 0x10001}}, {0x3, 0x6, 0x5, 0xffff, 'b],+.'}}]}, 0xb0) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:14 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3f) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:14 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x8, @time={0x9}, 0x8, {0x7, 0xe6}, 0x5, 0x2, 0x7f}) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', r1, 0x0, 0x7800, 0x101, 0x1000, {{0x28, 0x4, 0x0, 0x9, 0xa0, 0x64, 0x0, 0x5e, 0x29, 0x0, @rand_addr=0x64010100, @private=0xa010102, {[@cipso={0x86, 0x17, 0x0, [{0x5, 0xc, "6855ad8ce5f99051d3ac"}, {0x5, 0x5, "d1f784"}]}, @cipso={0x86, 0x3c, 0x1, [{0x0, 0xa, "931527965466e690"}, {0x6, 0x8, "b783631854b8"}, {0x7, 0xe, "124897fae7145a7d07cf704b"}, {0x0, 0xe, "b634512c3cc179551d120dc7"}, {0x1, 0x8, "9639e24c4068"}]}, @noop, @ra={0x94, 0x4}, @end, @generic={0x83, 0xe, "475a033512a811d473b04d62"}, @ssrr={0x89, 0x13, 0x90, [@rand_addr=0x64010100, @empty, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xf, 0x1d, [@rand_addr=0x64010101, @empty, @private=0xa010101]}]}}}}}) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x6, r1}, {0x8, 0x2, r2}], {0x10, 0x4}}, 0x64, 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') openat$rdma_cm(0xffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f0000000040)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="d0001400", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=0x0, @ANYRESOCT=r4, @ANYBLOB="fbc68b1e15d9ff244f816987c8a2447b2df656b76fb305769cb7de9a1cf0baddd85f80409f8d5cd75beef7bffdd84f6e026e3d7b482d47415eeffa8e433dde233e7be8d780a789104d5bc1c95bf175df7256adc7def41f52865f8dce256d7780a6156489d807a7152758bd10a2f9d501317ccf5c04af10bbaeb1a3567341cce648d0d5d6ae48f4b5fc778cd76f869ff1fa1ec5c6afa3327b413e51d620c14b88a70d9c00fc", @ANYRESHEX=r0], 0xd0}, 0x1, 0x0, 0x0, 0x2400a854}, 0x24000091) tkill(0x0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x401) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='net/psched\x00', r6}, 0x10) r7 = inotify_init1(0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r6, 0x80045301, &(0x7f0000000080)) fcntl$getownex(r8, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000300)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000000)=0x6) tkill(r0, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r6, 0x20008) 09:13:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:16 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:16 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0x200, 0x10000) 09:13:16 executing program 0: r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:16 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) sendfile(r7, r3, 0x0, 0xcf28) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000100)="a90202c0b74ea7abeb563f7f29f93ad202eca57489140f736970fe665b901884cac0cb7fd65116d0d7685b1e5cacc7e0263a38feb1454cadfa505e419c801b47714254f2ac3a80f4bba223664d2620c024e86bbbc3ec4a113e04169448a671dfb31f4f8200875ea3e8deb171dd66c20f5b293cd41aa36cfec15b0000000000000000000000c63b5367f1d95a6c20ab83ce2aa5288d48f611684dcbc9163fc272a4803dab04bc54be4465", 0xaa) bind$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x2710, @hyper}, 0x10) 09:13:16 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000000)={0x6, 0xa184, {r0}, {r4}, 0x78dd, 0x2}) tkill(r0, 0x3c) r5 = inotify_init1(0x0) r6 = fcntl$dupfd(r5, 0x0, r5) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$SOUND_PCM_READ_BITS(r3, 0x80045005, &(0x7f0000000000)) 09:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:17 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) recvmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/105, 0x69}, {&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000500)=""/32, 0x20}], 0x6, &(0x7f0000000580)=""/185, 0xb9}, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r1, &(0x7f0000000040), 0x2) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:17 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x406, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socket$can_raw(0x1d, 0x3, 0x1) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) select(0x40, &(0x7f0000000080)={0x4000000, 0x400, 0x1, 0x3, 0x7fff, 0x100000000, 0x5, 0x4e1a32ad}, &(0x7f00000000c0)={0xff, 0xe49, 0x3, 0x2, 0x0, 0x0, 0x100000002000000, 0x4}, &(0x7f0000000100)={0x8, 0x5, 0x100, 0x10001, 0x3, 0x0, 0x9, 0xf72e}, &(0x7f0000000140)={0x0, 0x2710}) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28}, 0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:17 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') r3 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') r4 = socket$l2tp6(0xa, 0x2, 0x73) tee(r3, r4, 0x10001, 0x0) sendfile(r1, r2, 0x0, 0x4000000000dc) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r6, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r7, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r8, 0x0, 0x4000000000dc) 09:13:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x800) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:18 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:18 executing program 4: r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x180000) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x3000, 0x0, &(0x7f00008f3000/0x3000)=nil) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000500)='/dev/dlm-monitor\x00', 0x8000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)={0x24, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x980}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r3, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x3c, r5, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x4d}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x6}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x2}, @NL80211_STA_WME_MAX_SP={0x7, 0x2, "198edd"}, @NL80211_STA_WME_MAX_SP={0x7, 0x2, "b4462e"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) 09:13:18 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='d \x00\x00', @ANYRES16=r0, @ANYBLOB="000229bd7000fbdbdf2502000000080061000200000008000b01070000001400020076657468305f746f5f6272696467650005003e007f0000000c00990001000000ffffffff08003f000080000008006a001f0000000500590040000000"], 0x64}, 0x1, 0x0, 0x0, 0x4080}, 0x20000080) r3 = gettid() tkill(r3, 0x3c) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x4000000000dc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)={0x24, r6, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x980}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r6, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_MESH_CONFIG={0x34, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0x8}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x3}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0xa28}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x4aa5}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40040c0}, 0x24040010) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000080)={&(0x7f00004bb000/0x4000)=nil, 0x4000}) 09:13:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r4, 0x1000, 0x7a}, &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'tgr128\x00'}}, &(0x7f0000000140)="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", &(0x7f0000001140)=""/122) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:18 executing program 4: r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:18 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) r1 = gettid() tkill(r1, 0x3c) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x4000000000dc) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@generic, &(0x7f0000000240)=0x80, 0x80000) sendmsg$nl_route(r2, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0x722, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x3}}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000011}, 0x8000) tkill(r0, 0x3d) r8 = inotify_init1(0x0) r9 = fcntl$dupfd(r8, 0x0, r8) fcntl$getownex(r9, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:19 executing program 5: open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:19 executing program 4: r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:19 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:19 executing program 1: r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20200, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x44, r2, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x42}]}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "184a63b844a4dcc95260fb90bfd0ead81d1be10f72013411dab18123ee394f8110fee5044845a8f9e05240c4c573bc6290b633f06c7c7695f5a5567c2d4d5a3e74094397e8b14cbeb4d4d95fe338fd3b768d8dca092c5f0ad5538b170fa09a6a44ec6b487f65d7bce9cc9d9e2a42a901a73870a0a2fbc429628aefe75ef531d096fb42232d87e1d004628bbcb4d66008717abfe2de8bc4479a6a2b251a55487612926a6d0e52c32c966f15207494bb93587ec0cae2a227c176c23340a3b490e20acfc67bce997e5b733bfe95d1f3c484ca4797ab65c6dd6912605c4f3759c1b95577302f146415c1f3bb83fd2c4a76c1c53266057a33"}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "989762ad5b3a9533662c169e2857f1d2a5406731e19cba4bdde24bcecca217e2327cfc7e7a211aeb447fbe7b29650609f3"}, @ETHTOOL_A_BITSET_BITS={0x0, 0x3, 0x0, 0x1, [{0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '/dev/kvm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, 'ethtool\x00'}]}, {0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '/dev/kvm\x00'}]}]}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8, 0x13, 0x2}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}, @ETHTOOL_A_COALESCE_PKT_RATE_HIGH={0x8, 0x12, 0x6}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW={0x8, 0x11, 0x8}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x7c}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x100}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x40000) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl(r6, 0x9bc, &(0x7f0000000440)="09b3c354179aeb3e33862e3bf522667254bf416f4b2de0a33b34884844165198552c29e1f38a7b98833c022ddde7656d6494c48c4af3ffc4fa41c76e40bf8ab593be0684196d3311c8e2fd10dba7") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) writev(r8, &(0x7f0000000400)=[{&(0x7f0000000280)="4d1256f81deb8e91d71e79e890b5c14a2a3f1b05100507cc05d4a0e20cb7d5d587a61347fa31ad0eb6a6e71900f8579cb19441308b4be8de7cbca6e0fc3c4a46791456a57ded7f884f", 0x49}, {&(0x7f0000000300)="bba490e7c6e5f8aafbbce5857ec3f36bcdf3ab650100fb7cd38c54dbcebd307bfb1b131b15ff164128d941d9b267cf13c1c103ed61e495dc6b6a5fd25599fdb874e71526a508e8373d76e0b198909e4d9b7a9553e4be0f66d8ee9395b1eaca710ea641b214a43cf4f150fecddda009384f8a8c73c1826ffed7e4f47b905eb565c3eeda5cec8acec9b1bd2d060dc2918bf07e40803f8f6140149a28c52113343b09dbe3362aeec910780827d29a1f3f2ee45faa0376b5e72b974698148cbc5346011b7b1570", 0xc5}, {&(0x7f0000000180)="f3f254d4", 0x4}, {&(0x7f0000000200)="82045365314cb98fe9c5e17455550139f44a522e92e6b38aafc26be4aff217269cfb62956a59f28b961ed661a2", 0x2d}, {&(0x7f0000000680)="571b6b27323752adade5a0a81de3aa356873facf049a73a08895d34a0cee5d643d56c21ddb332a0b5f3a88a9cf54783c2081e03958db2d08e8dc67a982d8fe20e7f94be7d2eff38dd679da24ca0f1cc91aa07df7786bc3854202e4a926f67a5f87c7cde0caabc825c6363115cb559b33d541807dbaf5ff07e9810b7f227bc3eaf22c02415d5036e2b3319a963fa09e469402325af7bdbe3014fdc54d71d310a868e14c1132ce3bf0bce6a7e294fd16603d9a4878abf141a3218412953127e8c2e5c00466654c63cc3ac13b4768883bbf38772c67d43aefe958f46d0014bf485525407ddbeb7f06025f0cb97c1cf4ed5a8134547ba19d05618f1b17a2d32a7dec4269e9f46143114989df18fefde38687fe5ec4b475448d4bca9973317f3c5d93c51d3445f943b679b18d9ca04fe18e3f70f52b98a48147720590e89760763b913d19d87ceaec1c5e9433c545253f7fde1d24439161e646990ac4f86273a2e7e184bf3165be5e646d81ffe86928e9e9e62c7a7233e1caa645f9528a0de48985162ff0549b93ba0b4130c2c3e431894ad6acb32fefa242e5124d1e916debd89e57bb7c175800ffa5f56e8bdd76e502725d44e2769ff5f0dda1c8aa7a3d947fc8876fe4dbfb8d4f2d36957182df73d1312112704c7728e7bc62a41eb5b6d8c63ea183265289545e09b89b1522730ed751d346a480fd1b7ae04716f9357f9d302829645c178ba6906615d99842e93cf369abd0a114ed6a172b3ce1cf772d8bb936cc8919dada25ae3f923ebcee48c27869e09818826691b2d2a03e9202f2f5511b828ac323be7f580cf63470759789779cd88d9faf42d6dc78b27c6a956780308dd6fa884b75c9b394f37eaa6c15461ed750557e8e350031ffec035449f558854e263cef974e670cd5068082fc5a615cc6a698102aac76c1c3f31d976c45bd30aa32d0f79b02df96cfbc8b27425c7c07a1b8f7397390c4c385e8f85235036d6061f92412c3404bbe16a4d8fabf469230b39dc8ef6296f08d5617b7a0f1a45b36bc234d14b1aac85ec96f933eb4f457760dd2a4b6814a46128f1eb6616294471e7fb9b492b5b3cc566a9c2ebedcc97cb39166c3add5c37de733889aeb2d731125b54f6bd4087a39cee365fe1c17e0b5c7796f44b581ae1514979887abbd02070ace8f2015f46de598b432acf80e1fe6e3ab9cb7de3ec55c85b99c124b1249c20764de4277931186e82601929469934b06b78b35bf3dc0ba57fe5e8cf2dcec51a3b29d6d8ac38779b6abb0799ff498d6e7c4be1b68883cd0ae7eda9668195dd19dee03bf708d1499931f5727e3dd92853c0ec7561389fde9252fd981848ab6fe64e82578289e31ee283106e8e0bc5ded56468d749745a50bf2040ff76308a4d01847e28e1d8af550fcce86da7a84232ea50c68d77d0454ecae71178d25ac9fcdf5cdc84ebc0f8149ec08fda993d74896ba7bc49c2b32aba4a9f73347a8fb7048453b004a9fa86312aa1dc8fa1ccba0454246c7bfb84c3061f5318884b4d3efa6f369fc95973ed50d1ecd33aea91fcbd959dd1434a1130fe8c5dfcb2be177ac4f0f0d10f9ce6ae555c39b933455354f3c2cb2347f5764fe28b22507d10ac2f54d81d341a50f99626ffae93c1b7a3a9e64bb844ab6f0f0553a4b57e9437c92e9eaf16a4e823f270794dca5b34b0c00a3d46d767ba26fb364f111459bc2bc4a5dc312130950a28952b07d19ae84ed9ad0d5d5b43ea4065e9e63ed14345b31d514e23b7d837c0be5acb1e1f88491f3bd690196bfdff2b8c901b614efec1e46c04253d9d7dc5f737fe4eabb6afc3fcf8129a76eaec401c24cd345cfd50050de9745a9f8b4a0d6606b7d6aba4ed02d07ef8ea0fbe203efac3699f068c2d469ebc126d7016694dc7162148f2b65c4c639a92a65b3c60db217e185e79d3c8394103d67ea591392a6e955df6553620e8a07aaf460e175d1bdcf91e7cc894b357f62c94674f27b1e0888d19ecc0c172324e8ea77bdc6f117f626beaf77069370e8d97c42a8324ba560aa5ed5edef7e03e1529b79cd968e212dc004848d4e78b7ff5e55c2aa384bb8f236803a4c1712d8302c4f95637b9e48c88e6244aaafdca5a060daec74877222c8678ed7550e9e8ed44fcaabfba7fa99ec0448b55b30bc8fedaa508f07ef9a7e4f80cd6394d66b16cffbd9457e62a02df0e97068091a95eb81c9867f8d909326ed9ff43bfc76d6bde10c3b859bef8628371c0577706eca453335abbfa6e7de71207aa28795beef9c4fee0ef0cce3693e12e1c64fc20043f2ea73d87620337c15cac1982b71ef9ae6176c59d422661dafbdd995f9895d86aab68578f33a9be2c0706633a492e95245514b020e89bbba3bd655b83394fe949cd7f8d8916b26c287af35fbcbce443a411a08a5569b86477f4673ba479bcdbaa9e459feea88daa688f098a65a4728e2ad0d34ad91ee5d6dcb105734a8ec711fe4e2f3229c1736bc435862f1d13f93ecf820dbff3fa7f8d22813b9bdc823acf7e10b6639b49d65f67cd8140cdd9100e4079bee4d25fc7d6a3cee03e4bf74da712ed31a599c58926bf1cf7a3b20e622c81ad91b9a5b5542ce382d4b3e572911ab31eeb7211ec1197203341dc8b75868f25b38f19fac5666c6d129ea7c599b85ab0ee3103061c9a3c0c9b191c5b10a2dfd82c26b9c80e4cef87dd71695ddfa47f0ebc4afb102ccd606f3102957ffb3d72eb4b1a51419ef1c9fd16da700230d54bebb311371d910f05097ad3969485ff9c35bd581223e453234759e90bae2690bc7ce5258708fafae18ee699c53209afedb44b18f4e5fccfeab6458827f72e3935d610fd67b21836a7b7653e1f501b4049544cccd6ae063094eb269161168d8d204d5d19d1da772f29d33d3718eaab7a1afd933a6df064b2b87243ddd989a2b0ab8e365f0b0f85e48365d736e3d30d687b2a25b23b0bd17f7db337f32bee6d0c2c8687bb3070ee3c765979fbb229365c7a07f80b9631dc6bbb25f087dd324e815f7e0068980a79bf0e41651f74e102f079b7a09bc56afc369d1b0b221facfcba0187f4c49eb2a1078f4e51dcb529154d004d2f800344df253ff3e1015a0c76d7e1c61ea5c65bb01cd8dc04c102e95e2fcf10ea93f033dbd7a2e627873882b49a2ecadceaef74271c147fe3736bb2cd204f1df3aab2c92f5cc5ed5c7fe95dc7e20a892ca298388faaebf1cca8b26125c35d8afac12e405dd3ea652cb0c1489ff49a06d3ca45ed6072690fde865e2dfac12131fdd77f3b92db971e4a68db82a78724a9433319168e1f1b477bce337dfc20eb7c51813829f55cb1446b5a7162aa2f66c95957dbfc7f4d33a33957004fe7abdbae8447af3ae07b6f078505c8445405da8abe6b96e0083bc388b73145a6524cd1d92ce54ae7d24062dd31a35b6c2eba1366e946359ae412f5ba02aee42e0f193bbf29ae6a4406ddfb021315c237ba2ff01f389191ff5666456345bd8cdf92f60d954538a09bb21c79fb7abc869ca1a8d0bd41ed9a1cde17d44e0f43d2493594725ae196b2edc11693f1f15cc14b573c3efb68eebaef969fcc06eff1efe49b3acd55938de4272a59a802dc3caae33671bf00ac31eecf5f62dd5538b34557382c2a476ee5fe3a3083b9b2e8ea2484beb74e165774e07a26745a7db81f9ae532853b7fb2482915d668c550cf93c561a73206fc69b94340509d0426827aaa9cb2e383a3862005d23d14286a44aa6d8dcd07e928c85612165a1a5e9c3e9df073ce6f037db51c5c0b92c0ae176680baf866fddb083837f4c0cc55b64a04158668d4a9d449191442070a51d62dad3e9d412a3bafc36a6a1f48807d27650dd54f08943427e81acec37e5b119c45eb12efcb60f2741e0ddd331a5ac06def0aff9d999d2b608159174886436b22ef601ee0cf03372c671f704953f54054f5dea675e68867896e8b7c239a04c693ad0849fe66bc7cf0ebfb69d9a4340335acc3df260913058299a49c75ca96f248f4dc713609f166e6f7324e5a154654f3ad36449cf1b4fdc531b11a4e0fc6fc51b6fd916d62c73d0e68125a70b8c0c26a920971f4eb2504cd01cd9809a1244af230d743c34a814cfa576ddc1d7644961406e092c8685efe49e7003791b4f1e138a9051a20980ae31846b0de22ea1aae0819d5aa0eb719427a3c996051ea2d8d9a1194858820883b633d90f510c1444e051f74ad7e74ed05da240b09950fc3ef84ac7ad629a30e6ebee643b1aedbaa2e9a537730c9321832cba0f348c5055abd9d9f92565bcc43a08259c78ea23ca94925358e543cffe83ef6460579c44021e052781b90ee30067876b1f01d6b7a005a29d96a9529915cca0246149bf59bb0bdfeb0595a7bd7a1f3b2c4873ea943d27b404838beca6b9e63b1d89de53c1b2bea56f509f79ff42de3f93e107bf9d49f930341a8dd75f89d9482a1e60681ab1268c536dea4652b5cd4056933ac576903f1903ae42cab0b66bb94594d5c064dfa0e58fcf11527872f9d04915be0a1c8295c6ee0b8afff531d3652da9ee9f40952e00ec7ad9b0bb5e9203ee3f5ecb0b28731b42c9c4f124b141bdef95da6c75dd57cb859b9e22b4b8cd62e928a2d2fef1a128bb34a6b59e81201ec73f2afbd319c483600e43229203ff34af3d8f819916b1107a1a518bf306627f99b7e0995bc9e8f66c2642b95673b87f250a014b244cd5955605d5a9972643e609180c39bc69b9c9014fc5a608a93d0d8101347a6506c1ead09afe6e408f312750bebdfc4fcbf055aa067298dcda2cadad158d739216b80e025ab8fde185bb75274aa44060eab33401b9ba74432658e708e1bcfaac5be48159905f4bd7830df7db9f5a966ee6b5ce67cac1a369c725db2c697a7715ca2fdbb8f419e06dc84f4dec5ab99f078b48b135c821602c6902bae75250f92b4cbbd720839a28630baa6320c7bff8dd4fd89628b706f89a3980e634cd56b1d1be3e983a8fc825a7a49c6bd3eda1bd221d042bb80dd7af354db2a58ad522589d7ef94621baae2e94272aa2fd4543ad2372f0522ac273d49476bd9558a809edada0a939eeb6fe290826d05bc0d6a4514763441f5c03676fd97e12324b4433f9f35e535e01745b59c88bd5f71db58e85d010e09be4f500ba327b9856c3c9a9e0c7e35d43ae904a429760c9900d04b1d176b01ce08fbb689bfe490d269429205ce0668d50cbab0b548a10c77d4851a116b6b73ad087ee381dc5f7be3a404f8aefd4969aba52f2b7685d500343640abc3b2ad46f9f2b576d19234c07e22ef31a57e900bc7dcbc3a081ea06b22dd948bb6bab51d80e450bcaedde304c01f75a8c36891c68db446b81b6af05f2c57b098ebb9172a3cd674ce14197a174e58191f7be3fb8e3f337430dcde109b3e04e787462edcb7ee6c1fb6a698d262b18e25c104ed6968d321ceeb49785d534ad2b33157eca046b2ed58dd9b2e1d689ba8462a9a343e98b005402b805f0fa9dda71763f0712b8e1b36c4496ee5dc7bf8535ac37279b81215ab63581f3c195fb310da46204a9b0dac969f04aa0b550e0ef9b0f50d61d4b4672e66464ffc24230163fa062ddc59a2f8ea0915113fdc71d497e7dcc061c78a20a6b855d79acf71e0ff9fd4bdabac4eb45c0c58b934389fdb058f17e4e52e3e271f9e3554f9edec12f2cd2347b419c34be368637e3a842edba0e954367c68fd3329fa556a170eb2827a052f1fb1c3eebd0a6060eeb7dd4e01f2ff581a486c14d5cc1802c4e09e6ee61403b31fe4a886919bb58a33a36e3c39a339f729fafa9a39f695c", 0x1000}], 0x5) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00004ce000/0x3000)=nil, 0x3000, 0x800000, 0x7, &(0x7f00007fb000/0x800000)=nil) 09:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:19 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = openat$autofs(0xffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000080)) r2 = inotify_init1(0x0) r3 = fcntl$dupfd(r2, 0x406, r2) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) ioctl$SOUND_MIXER_WRITE_VOLUME(0xffffffffffffffff, 0xc0044d14, &(0x7f0000000000)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:19 executing program 1: r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10303, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) r3 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r3, 0x10, &(0x7f0000000040)) mremap(&(0x7f000071a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000627000/0x1000)=nil) 09:13:19 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x32}}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:20 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) 09:13:20 executing program 0: clone(0x7c23cf00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) flistxattr(r1, &(0x7f0000000000)=""/53, 0x35) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:20 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:13:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) ioctl$DRM_IOCTL_MODE_DIRTYFB(r6, 0xc01864b1, &(0x7f0000000040)={0x2e, 0x2, 0x5, 0x4, &(0x7f0000000000)=[{0x6, 0x80, 0xbfd, 0x4e}, {0xffff, 0x9c1, 0x800, 0xe5ed}, {0x5, 0x2, 0x3ff, 0xf000}, {0x7f, 0x6, 0x5, 0x81}]}) sendfile(r3, r4, 0x0, 0x4000000000dc) flock(r4, 0x5) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:20 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) 09:13:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x7, &(0x7f0000000580)=[{&(0x7f0000000080)="cc07000000dcc06bc5812fd130d2f95eefb82832a3da8c5a86637e944285e083fcb5c5b33f798a7d70d749156bb9addb949ba14265089e40795f42592bbe7c9d46285c29f20df928807c3c595f37625264c4221d700589f6af1c193088abc6762fbaf2c0f7bf8b25449ab804ad097fa41108c3a8768a60c657628a083998fdaf573f6e7a183c0070b244ffe0a6f456fb47cc657148aaf76cdb38f97fa42bd084a624e474ba3559d5d1363f2a00e151167106a9493224ff496028", 0xba, 0x3}, {&(0x7f0000000140)="c2991bdfa0940359a5b6fa8a3936ba9449a1cac495f2f8af5a78de09cbab3de885ae3b3a90f161cc9bae86c4d03dddddf6bff1a755b05b18a205a3e70dcb77ae3be6f8b541a4444f6aca3766f5899fadea497ebfe2e2581e6f53e93bc6a767e8d005f14d5507b934a7ab93c260ae39979b6173ec68c8942365fd53b748ee4527a0e909c54d00dfa39610bce172e82c6cf8fb", 0x92, 0x8}, {&(0x7f0000000200)="4c25ebc04da5909a663482b4891dea0a17d7ecd5d96283da6a91b1a0", 0x1c, 0xffff}, {&(0x7f0000000240)="384dd1530008ae3992acf34d0d9b3b76993f43cc52b0ff249a2be7b1ab5e716ac7e566794eef9416031210999232c3b6c6607e3b2f0c45b50b3574f4e9fcd7c6defe87cac809beb13d32c6b8", 0x4c, 0x6}, {&(0x7f00000002c0)="986593f4c1d49e2b07da814c535b497340fefc9352fe7460286eb8d49e996dbc827fa52380a8f2f0bc9f2270f3b36cc081e3384b358555f3f28ac18d43c8586915703b7bf73e767cb1194d79a31d55664dd0601d6af0a781d06d25974f328078f26c659ea21dc3b05e733efe7239a7c76a12e3ab5dbc58d133b53b6fc6c76b89570d66817946cd97ab09f42cb4875945ded9eed218d481ed7df7e41f3d5db9cc0a0f0e0e0f80699e5a5dcc58d618498da90a3c1d7745f65307a916e7b9e8d990365b9f492799d5061f0b8939829ef66935da4bd87fa1d78447e80eb1d52fe903d67ed8e643321d42984558a9f371", 0xee, 0x6}, {&(0x7f00000003c0)="50c33922fe68a1e9cea2a7fd5428cf1613c73aff50fd2de8a0d23e06d56603a606d47fd2fc317d931fc1bbbceaf6696f8bf8f305543e3d7ac37ee176b7d97bf4b6e71df09ef039e1fa5db5f2a6e381ab5d77bd04ced5d82006627348b6043ed59df47106ea4f070dedbf202ae3c359ccc569868b9c196380d4e0bbb2825ec66b3dcc4a752eb01cdc69", 0x89, 0x7}, {&(0x7f0000000480)="ffc2fbb94080b21e01ae633e99b1aad0e31004fea19393da9ed0d805c0bc46f188286a29439f4c070d63aa1a5f17c843b62bfd61bb0c06f0717abc7a11d3d141dc42490a50975b0f5ad1e355845b7eedbea991e792f3b6a57b9af3979c2d9d2a9bedfc700736b44170951e858a07f5d14d4af52f6d1ebb2ccddb4ad2160128dfc7ebb3a12e23b5d9369ff6a806036262c30715489a8c74c728e49f90b6d48b9ed1ee852a306e9c4479863a09ac7e0c6d829b91853818f503db42ba1183fd8e862a2adc", 0xc3, 0x2}], 0x1000, &(0x7f00000006c0)=ANY=[@ANYBLOB='uni_xlate=0,shortname=mixed,fowner>', @ANYRESDEC=r1, @ANYBLOB='\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r6 = getpid() setpriority(0x0, r6, 0x0) ptrace$setopts(0x4200, r6, 0xfff, 0x51) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r7, r8, 0x0, 0x4000000000dc) ioctl$ASHMEM_SET_SIZE(r8, 0x40047703, 0x10000) 09:13:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28}, 0x10) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:20 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(0x0, &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) getdents64(r2, &(0x7f0000000040)=""/52, 0xffffffffffffffcf) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r5, 0xf503, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r6, 0x0, 0x4000000000dc) r7 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_buf(r7, 0x29, 0x0, &(0x7f0000000080)=""/213, &(0x7f0000000180)=0xd5) connect$pptp(r6, &(0x7f0000000000)={0x18, 0x2, {0x2, @private=0xa010102}}, 0x1e) 09:13:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) 09:13:21 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:13:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0x12, 0x10000, @udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x4004810) 09:13:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(0x0, &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000731000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000445000/0x3000)=nil) 09:13:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), 0x4) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) ioctl$IMHOLD_L1(r5, 0x80044948, &(0x7f0000000040)=0xfffffffb) r6 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r6, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:22 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}, @TCA_EGRESS_BLOCK={0x8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1f}]}, 0x40}}, 0x0) 09:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(0x0, &(0x7f0000000280)) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000040)={0xae, 0xa32, "1bf40b478be2f0c93e963dec0eab46d569cb579d9c4dc090b6aee7a61b492062e38c951b9da78772bb5cde9526f1b44677e9700cfb33482e8c2c9c43bbbace8809c1c54057cb4d3c0694bb2b2b2c8208914b8c9a595d0f1d002e2afdbc668b9bdd5f61833f2b5c16ed9f67e85d9ef7e4611882a3317bfbb84ecc5867be2ffc17ac16f8e6f042f9a07188d261da2bb39b56423ca3ff52d061f235b23aff19fc4df2744ec6b1ad"}, 0x81) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000100)={r9, 0xf3, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r10, 0x9}, 0x8) 09:13:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e22, 0x8, @remote, 0x8}, @in6={0xa, 0x4e22, 0x8c18, @empty, 0x200}, @in={0x2, 0x4e20, @empty}], 0x58) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:22 executing program 2: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000780)={0x81, 0x0, "780ac029223891683080cf965250b334089bf965722c0c0686bb422ed5e9e7b034bd87ecb328b3c6bc9c8ed3e21e0a9f4755570686817522a8e296a18a85c7bfda7956ab4df2afc7ad0b5f895ec0335c240a142b804a754ad4731653721afe42bf5eae3553a332373695d92838e712aafd0eb9de2976b8ca86"}, 0x0) 09:13:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) timerfd_gettime(r3, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) getsockname$inet(r5, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) write(0xffffffffffffffff, &(0x7f0000000180)="a023943ac575f7fca64fe8600cd529e4cd8466b9464de87e5d15f1c90c4448c024638d503164c0b521261661f647718d3436924ebc4b031916adf042c140a471dc121426527e4d6f78901ba3ac7da14af325ab49750f64a570849dc18b4a4e56b6faabed1acc7abc20270bf7d00287178dcfa1a06a2348117ccb8ec75878a8e575070a106094b8f1e9db3ae9e96b16501d1ee0571bf276953aa92532352569008603d2755d7acf13338880c2dca75ccbed36912477e3d998f3275261f758a310925845872c9a688c933c97efb5c565293d7c7e62", 0xd4) openat$vim2m(0xffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) mremap(&(0x7f0000d70000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000cfd000/0x1000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r6, r7, 0x0, 0x4000000000dc) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r6, 0x8008f513, &(0x7f00000000c0)) 09:13:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000000)=0x6) 09:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40004, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000001c0)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 09:13:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xb) tkill(r0, 0x3c) r4 = inotify_init1(0x0) r5 = fcntl$dupfd(r4, 0x0, r4) fcntl$getownex(r5, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r3 = openat$sequencer(0xffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) 09:13:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x1000003c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000040)=']\\-,!\x00', &(0x7f0000000080)='\xe5-(\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffe01, 0x80000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r4 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = getpid() setpriority(0x0, r3, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000000)=0x1) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x101800) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000040)=0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioprio_set$uid(0x0, 0xee00, 0x0) tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000dc) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc04c5609, &(0x7f0000000180)={0x8001, 0x2, 0x4, 0x800, 0x1f, {}, {0x5, 0x1, 0x5, 0x40, 0x6, 0x8, "43b97707"}, 0x0, 0x4, @planes=&(0x7f0000000140)={0x40, 0x9, @mem_offset=0x9, 0xfff}, 0x200, 0x0, r3}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000200)) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) r5 = getpid() setpriority(0x0, r5, 0x0) r6 = socket(0x18, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000080)={0x7fff, 0x1f, {r5}, {r8}, 0x6, 0x8}) ptrace$poke(0xcfec853302a95385, r9, &(0x7f0000000040), 0x66) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:25 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(0x0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x328, 0x400100) ioctl$FIONCLEX(r2, 0x5450) r3 = fcntl$dupfd(r1, 0x0, r1) sendmsg$IPSET_CMD_ADD(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x7c, 0x9, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010100}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x4}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4008800) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) capget(&(0x7f0000000080)={0x19980330, r0}, &(0x7f00000000c0)={0x5, 0x401, 0xd8, 0x400, 0x1000, 0x401}) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 287.209543][T12415] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 09:13:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x0) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) read$usbmon(r1, &(0x7f0000000000)=""/124, 0x7c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x6, 0xa2, 0x7f, 0xf98e}}) 09:13:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x0) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x0) wait4(0x0, &(0x7f0000000100), 0x80000000, 0x0) 09:13:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x3) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)=0x89) r0 = gettid() creat(&(0x7f0000000140)='./file0\x00', 0x62) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = accept4$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000040)=0x1c, 0xd3d6726cfd4b68b5) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r5, 0x101, 0x0, 0x1}, &(0x7f00000000c0)=0x10) tkill(r0, 0x3c) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x80000000, 0x0) 09:13:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r3, 0x0, &(0x7f0000000000), &(0x7f0000000040)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:27 executing program 0: clone(0x20022004f7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x4) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) fcntl$getownex(r5, 0x10, &(0x7f0000000080)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r7, 0x203, 0x0, 0x0, {{}, {0x0, 0x4101}}}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r7, 0x200, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x4004000) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000000)=[{{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x1}}], 0x18) 09:13:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x80000000, 0x0) 09:13:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:27 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/consoles\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x0) lseek(r0, 0x1000000000000003, 0x0) 09:13:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x80000) wait4(r0, &(0x7f0000000000), 0x8, 0x0) r2 = openat$proc_capi20(0xffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2d4e00, 0x0) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0xaa) r3 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:28 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/consoles\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x0) lseek(r0, 0x1000000000000003, 0x0) 09:13:28 executing program 1: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$zero(0xffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x781001, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r1, 0x4142, 0x0) tkill(r0, 0x6) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00006c1000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f000071f000/0x2000)=nil) 09:13:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x80000000, 0x0) 09:13:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:28 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/consoles\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x0) lseek(r0, 0x1000000000000003, 0x0) 09:13:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x800) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x0, 0x0) 09:13:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 09:13:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/consoles\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x0) lseek(r0, 0x1000000000000003, 0x0) 09:13:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x0, 0x0) 09:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e296) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffed3) 09:13:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:29 executing program 2: syz_emit_ethernet(0x14, &(0x7f0000000200)={@local, @remote, @void, {@generic={0x8863, "2f0559ffe0cc"}}}, 0x0) 09:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) 09:13:30 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() lstat(&(0x7f0000000200)='./file0\x00', 0x0) tkill(r0, 0x3c) wait4(0x0, &(0x7f0000000100), 0x0, 0x0) 09:13:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000300)) 09:13:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 09:13:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) r3 = openat$null(0xffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xa000, 0x0) write$P9_RGETLOCK(r3, &(0x7f00000001c0)={0x20, 0x37, 0x1, {0x1, 0x63, 0xec, r0, 0x2, '#*'}}, 0x20) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff00b23400000000000000000030b6dea64a3cb8439c4faed42bdc7e084b6bd00ecbb18d6a3e6355eb7c5bbd0c6da14eea503b040827b6ce10847943317c25fbf17ca7e13952f2a0281b17418b13365c23bfe8dca8399199391539f58b2cf91c3383f16f69751b48f64fc829014f1f68071966729019568e5528e6922ed5ef0e397ced801d81191bb8cb4dd3a0e15782a5ea", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010065727370616e00000c0002800600020030000000"], 0x3c}, 0x1, 0x0, 0x0, 0x48001}, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaa607a5e34794710bdaaaaaa0000e90c300000000000000000000000000200"/47, @ANYRESDEC=r4, @ANYRES32, @ANYBLOB="49de8464c9223fd16c062a52b05fd333338768b2b39e76f6d25dca2fe35f6d051d74e5579adaa24a3bdcdd0fedfc542762eb44e9d2c436b82404bba160a846ae706a7f65ead0d6ebf533ea29f5bb4514533d1d8fcef0751e7e79da7213993b454767873648c4ec01697b9fed2ff950468a99c64767d51727ba05c4286fd913e4b24d42aa66945ca43b71075d76a4b29fd964c9393e2e734be4d869e5a94c352a88516ece74fcfafc7f2ba99b4a31bb5109c8bd9a604eeb0608052824f79b29bc2e152782c1f663948139ac919ae09f40923337250b0a4622425ca35ed9a28ca33d47b330fbc2c55cdf8295"], 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="2400d36d887e0939070040b3010064edb6820fc720471ebf868ea124feac4f2e3302c34546c91410b123deed91e4b5fd5f46fbaa7b8f800c762aa86ace6ad9c4d3d1b48965338032eaae969d6e2a45345c9e6ee33bb7ceb819716776a5a1b7864ed8321a15824456a9ec84f345434d15d10fa031d8f0aade89cc19788e6638b5ad919599fb3ca98655c819dd1277d428d6e8207853eb70ea23e02c181f03e43892d41fb39337793c86800be7a96af493663597f42be7e7d5ae097a", @ANYRES16=r5, @ANYRESHEX], 0x24}, 0x1, 0x0, 0x0, 0x4801}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x4) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r5, 0x12, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x1b}}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '\xc0\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}]}, 0x70}, 0x1, 0x0, 0x0, 0x8040040}, 0x1) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) gettid() [ 291.695329][T12633] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 291.731192][T12633] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12633 comm=syz-executor.1 [ 291.794365][T12637] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 291.847036][T12637] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12637 comm=syz-executor.1 09:13:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000300)) 09:13:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) r2 = getpid() setpriority(0x0, r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0186405, &(0x7f0000000000)={0x2, 0x9, {r2}, {r5}, 0x80, 0x1000}) tkill(r4, 0x16) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 09:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:31 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000000000)="a1", 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\a', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7c, &(0x7f000059aff8)={r3}, &(0x7f00000001c0)=0x8) 09:13:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) 09:13:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x16}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) 09:13:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000300)) 09:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000040)=0x20c487, 0x4) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r4, r5, 0x0, 0x4000000000dc) ioctl$SNAPSHOT_S2RAM(r5, 0x330b) [ 292.761680][ C0] hrtimer: interrupt took 49635 ns [ 292.924223][T12676] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:13:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000300)) 09:13:31 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x201}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 293.017100][T12676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.027822][T12676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x80800) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 293.618593][T12689] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.634541][T12689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.643043][T12689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x16}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) 09:13:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0185649, &(0x7f0000000100)={0x980000, 0x802, 0x8, r3, 0x0, &(0x7f0000000080)={0x990a6d, 0xc5, [], @p_u8=&(0x7f0000000040)=0x5}}) r5 = gettid() tkill(r5, 0x3c) r6 = inotify_init1(0x0) r7 = fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r7, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 294.050014][ T32] audit: type=1804 audit(1595409212.900:10): pid=12705 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir235287822/syzkaller.lYStFD/58/bus" dev="sda1" ino=16207 res=1 [ 294.164824][ T32] audit: type=1400 audit(1595409212.940:11): avc: denied { module_load } for pid=12699 comm="syz-executor.4" path="/root/syzkaller-testdir235287822/syzkaller.lYStFD/58/bus" dev="sda1" ino=16207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 09:13:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x2000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) [ 294.196393][ T32] audit: type=1804 audit(1595409212.950:12): pid=12705 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir235287822/syzkaller.lYStFD/58/bus" dev="sda1" ino=16207 res=1 [ 294.396842][T12713] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.461930][T12713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.471459][T12713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:33 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x201}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:13:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x5}, 0x26) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'veth1\x00', &(0x7f0000000080)=ANY=[]}) bpf$BPF_GET_MAP_INFO(0x2, &(0x7f00000000c0)={r0, 0xfffffde9, &(0x7f0000000040)}, 0xc6) [ 294.919912][ T32] audit: type=1804 audit(1595409213.780:13): pid=12729 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir235287822/syzkaller.lYStFD/59/bus" dev="sda1" ino=16288 res=1 09:13:33 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x201}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:13:33 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x3000, 0x3, &(0x7f0000d21000/0x3000)=nil) 09:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:13:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x16}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) 09:13:34 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3fc, 0x80, 0x0, 0x6}]}, 0x8) [ 295.364971][ T32] audit: type=1804 audit(1595409214.220:14): pid=12741 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir235287822/syzkaller.lYStFD/60/bus" dev="sda1" ino=16260 res=1 09:13:34 executing program 1: clone(0x40102080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:34 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) 09:13:34 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x201}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="04"], 0x2, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 09:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 295.888152][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 295.958371][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.968504][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.998889][T12764] IPVS: ftp: loaded support on port[0] = 21 09:13:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:13:35 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) [ 296.129471][ T32] audit: type=1804 audit(1595409214.940:15): pid=12769 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir235287822/syzkaller.lYStFD/61/bus" dev="sda1" ino=16291 res=1 09:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) 09:13:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x16}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 296.519321][T12764] IPVS: ftp: loaded support on port[0] = 21 09:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) [ 296.909102][ T37] tipc: TX() has been purged, node left! 09:13:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 297.227717][T12831] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.304772][T12831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.315915][T12831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:36 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) 09:13:36 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1c, r0, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 09:13:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r2, r3, 0x0, 0x4000000000dc) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x5, 0xfffffff8, 0x1, 0x7ff}}) r4 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:36 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) 09:13:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:37 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:37 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000600)={0x0, r2}) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 09:13:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x937e, &(0x7f00000003c0)="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") 09:13:37 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 09:13:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:13:37 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r3, r4, 0x0, 0x4000000000dc) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000000)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:13:37 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_MM(0x23, 0x7, &(0x7f000060f000/0x8000)=nil) sendfile(r0, r1, 0x0, 0x100000080000000) [ 298.903007][T12873] autofs4:pid:12873:validate_dev_ioctl: path string terminator missing for cmd(0x0000937e) 09:13:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x78, 0x30, 0x301, 0x0, 0x0, {}, [{0x64, 0x1, [@m_skbedit={0x60, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8}, @TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6}, @TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 09:13:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 09:13:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x937e, &(0x7f00000003c0)="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") 09:13:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) [ 299.462468][T12893] autofs4:pid:12893:validate_dev_ioctl: path string terminator missing for cmd(0x0000937e) 09:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001a000f00000000000000000080200000000006"], 0x1c}}, 0x0) 09:13:38 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) r1 = socket(0x11, 0x800000003, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 09:13:38 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x6, 0x9fb}) 09:13:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x937e, &(0x7f00000003c0)="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") 09:13:38 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 299.908940][ T32] audit: type=1400 audit(1595409218.761:16): avc: denied { create } for pid=12903 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:public_content_rw_t:s0 tclass=packet_socket permissive=1 09:13:38 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000e00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000500)}]) [ 300.087559][ T32] audit: type=1400 audit(1595409218.801:17): avc: denied { connect } for pid=12903 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:public_content_rw_t:s0 tclass=packet_socket permissive=1 09:13:39 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e0000001800028014000b"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 09:13:39 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x6, 0x9fb}) 09:13:39 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x34, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x761}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x34}}, 0x0) 09:13:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x937e, &(0x7f00000003c0)="0100000000000000180100000500000300000000000000002fd4d0cf7635ca55c53ba9c63d2c508f039786d815a7e669f5922aa9264de11b31ca232e29d362bcc7581b3dd5cff7a2160413257bf943d3582e6211ad63cf1003796c3af15c85b10c944b7d15b316519b51d64e4677689b300e0d436868f5deb7a1d9c0755d896222c5ebacc9925dc09ad318bb50e5f1fb4c886ff0549cb7572d1758fe66ce2c90b1199baa689dcddc8fc25226b7cee893eef8d5a8c456b3682c09bf7e72d9c79a50c154e66fbbf03c238b2f9cfb1488dcd10e2383221a0b972dcf33b6d04616710192ab525da82d0eb1ccf0fdb2c64975d652dfec1ca7900b9122f52ddca8dc4ba53c2645f0675755e144813511fe04b0499d45f28b36e327") 09:13:39 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 300.559465][T12926] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 09:13:39 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f00000002c0)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x7fffffff) [ 300.756292][T12934] autofs4:pid:12934:validate_dev_ioctl: path string terminator missing for cmd(0x0000937e) 09:13:39 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x6, 0x9fb}) 09:13:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x1c, r1, 0x31905e13403123b7, 0x0, 0x0, {0xd, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x50000}, 0x0) 09:13:39 executing program 3: r0 = openat$mixer(0xffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)) 09:13:40 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f00000002c0)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x7fffffff) 09:13:40 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x6, 0x9fb}) 09:13:40 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 09:13:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$setstatus(r0, 0x4, 0x2000) syz_emit_ethernet(0x16, &(0x7f00000000c0)={@link_local, @local, @void, {@mpls_mc={0x8848, {[], @llc={@snap={0x0, 0x0, "9a", "1c974b"}}}}}}, 0x0) 09:13:40 executing program 3: r0 = openat$mixer(0xffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)) 09:13:40 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f00000002c0)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x7fffffff) 09:13:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4080, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xc0082, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(0x0, 0x2, &(0x7f0000000400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x8, r3, &(0x7f0000000140)="771c09dfde1bae3e65f69716ff037fc2738a99ffa4515b55fd8307937bba4c04f7e0cc25e479815d8015802b640ec3b0289d3f7fccc11b4f0a6bc9304140afe20658235d97e85f5bfc17bfcb2cce35c611888d2dfb00707755e97ee73dfee8", 0x0, 0xe4e, 0x0, 0x2, r6}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000200)="d44ead45795612da2ebd576321d2b94d9295", 0x0, 0x7ff, 0x0, 0x3, r4}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x501, r2, &(0x7f0000000380)="11244231336a170492813def2a646ebfd6547124118b1006372f5e6261d336c7b10a86e48c22ef075e5f3a5c9e2cb1837c25f7dd1e965ba3d55cd5", 0x0, 0x4f61}]) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x68, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_PMTUDISC={0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x40}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0xffda}, @IFLA_GRE_LOCAL={0x8, 0x6, @loopback}, @IFLA_GRE_TTL={0x5, 0x8, 0x3}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) 09:13:40 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x800, 0x800}, 0x1e) 09:13:40 executing program 3: r0 = openat$mixer(0xffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)) 09:13:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'veth1_to_batadv\x00'}) 09:13:41 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:13:41 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f00000002c0)='/proc/cgroups\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x7fffffff) [ 302.437330][ T32] audit: type=1400 audit(1595409221.291:18): avc: denied { create } for pid=12977 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 302.459022][ T32] audit: type=1400 audit(1595409221.301:19): avc: denied { name_connect } for pid=12977 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 09:13:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4080, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xc0082, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(0x0, 0x2, &(0x7f0000000400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x8, r3, &(0x7f0000000140)="771c09dfde1bae3e65f69716ff037fc2738a99ffa4515b55fd8307937bba4c04f7e0cc25e479815d8015802b640ec3b0289d3f7fccc11b4f0a6bc9304140afe20658235d97e85f5bfc17bfcb2cce35c611888d2dfb00707755e97ee73dfee8", 0x0, 0xe4e, 0x0, 0x2, r6}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000200)="d44ead45795612da2ebd576321d2b94d9295", 0x0, 0x7ff, 0x0, 0x3, r4}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x501, r2, &(0x7f0000000380)="11244231336a170492813def2a646ebfd6547124118b1006372f5e6261d336c7b10a86e48c22ef075e5f3a5c9e2cb1837c25f7dd1e965ba3d55cd5", 0x0, 0x4f61}]) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x68, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_PMTUDISC={0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x40}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0xffda}, @IFLA_GRE_LOCAL={0x8, 0x6, @loopback}, @IFLA_GRE_TTL={0x5, 0x8, 0x3}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) 09:13:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 09:13:41 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:13:41 executing program 1: migrate_pages(0x0, 0x0, &(0x7f0000000040)=0x80000002, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040), 0x1d4, r0) 09:13:41 executing program 3: r0 = openat$mixer(0xffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)) 09:13:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x812, r0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000140)) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 09:13:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 09:13:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4080, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xc0082, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(0x0, 0x2, &(0x7f0000000400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x8, r3, &(0x7f0000000140)="771c09dfde1bae3e65f69716ff037fc2738a99ffa4515b55fd8307937bba4c04f7e0cc25e479815d8015802b640ec3b0289d3f7fccc11b4f0a6bc9304140afe20658235d97e85f5bfc17bfcb2cce35c611888d2dfb00707755e97ee73dfee8", 0x0, 0xe4e, 0x0, 0x2, r6}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000200)="d44ead45795612da2ebd576321d2b94d9295", 0x0, 0x7ff, 0x0, 0x3, r4}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x501, r2, &(0x7f0000000380)="11244231336a170492813def2a646ebfd6547124118b1006372f5e6261d336c7b10a86e48c22ef075e5f3a5c9e2cb1837c25f7dd1e965ba3d55cd5", 0x0, 0x4f61}]) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x68, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_PMTUDISC={0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x40}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0xffda}, @IFLA_GRE_LOCAL={0x8, 0x6, @loopback}, @IFLA_GRE_TTL={0x5, 0x8, 0x3}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) 09:13:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:42 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:13:42 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) rt_sigaction(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000200)) 09:13:42 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0xf) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 09:13:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:42 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0xf) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 09:13:42 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:13:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4080, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xc0082, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(0x0, 0x2, &(0x7f0000000400)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x8, r3, &(0x7f0000000140)="771c09dfde1bae3e65f69716ff037fc2738a99ffa4515b55fd8307937bba4c04f7e0cc25e479815d8015802b640ec3b0289d3f7fccc11b4f0a6bc9304140afe20658235d97e85f5bfc17bfcb2cce35c611888d2dfb00707755e97ee73dfee8", 0x0, 0xe4e, 0x0, 0x2, r6}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x3, r1, &(0x7f0000000200)="d44ead45795612da2ebd576321d2b94d9295", 0x0, 0x7ff, 0x0, 0x3, r4}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x501, r2, &(0x7f0000000380)="11244231336a170492813def2a646ebfd6547124118b1006372f5e6261d336c7b10a86e48c22ef075e5f3a5c9e2cb1837c25f7dd1e965ba3d55cd5", 0x0, 0x4f61}]) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x68, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_PMTUDISC={0x5}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x40}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0xffda}, @IFLA_GRE_LOCAL={0x8, 0x6, @loopback}, @IFLA_GRE_TTL={0x5, 0x8, 0x3}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) 09:13:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0xf) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:43 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=ANY=[@ANYBLOB='file_umask=00000000000000000000001,type=M']) 09:13:43 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8994, &(0x7f00000000c0)="aa9069175fa7b0a7f93982b4f93a") 09:13:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 09:13:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 304.794614][T13057] hfs: type requires a 4 character value [ 304.800679][T13057] hfs: unable to parse mount options 09:13:43 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=ANY=[@ANYBLOB='file_umask=00000000000000000000001,type=M']) 09:13:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0xf) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) 09:13:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x800, 0x2, 0x0, 0x0, 0x8, 0x600}, 0x20) 09:13:44 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={'cbcmac(serpent)\x00'}}) [ 305.293670][T13074] hfs: type requires a 4 character value [ 305.299555][T13074] hfs: unable to parse mount options 09:13:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfdfff00c}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) open$dir(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 09:13:44 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000400)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10841, 0x8e10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:13:44 executing program 5: connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe9, 0x0, &(0x7f0000000080)) 09:13:44 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=ANY=[@ANYBLOB='file_umask=00000000000000000000001,type=M']) 09:13:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) [ 306.007181][T13094] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 306.027423][T13102] hfs: type requires a 4 character value [ 306.033487][T13102] hfs: unable to parse mount options [ 306.115552][T13094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.128855][T13094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a000000000010904000000000000000000000000240001801400018008000100ffffffff08000200ac1414000c00028005000100000000003c0002802c00018014000300200100000000000000000000000000021400040000000000000000000000ffff000000000c0002800500010000000000080007400000000024000e80140001800800010000000000ac1e00010c000280050001"], 0xa0}}, 0x0) 09:13:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) [ 306.704821][T13097] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 306.797669][T13097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.805643][T13097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:45 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=ANY=[@ANYBLOB='file_umask=00000000000000000000001,type=M']) 09:13:45 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000400)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10841, 0x8e10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:13:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) [ 307.195416][T13114] hfs: type requires a 4 character value [ 307.201701][T13114] hfs: unable to parse mount options 09:13:46 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) [ 307.856534][T13123] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:13:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x20000081}], 0x1) [ 307.972836][T13123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 307.985351][T13123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000300)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, @timestamp={0x16}}}}}, 0x0) 09:13:48 executing program 5: r0 = socket(0x2b, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005840)=[{{0x0, 0x0, &(0x7f0000001e00)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a00)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}, {&(0x7f0000001c40)=""/250, 0xfa}], 0x9}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 09:13:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0xc3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x401}]}}}]}, 0x3c}}, 0x0) 09:13:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="5001000010000307ebfff40606c6000040040000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a00100000002500120008000100766574680000000018000200000033d2b2bde9d40319696b905711068b27da6fff0744d4d2176644649a1f5319f68d2b13651a643ba1d864dc423db53c56eb2b04361972eba624cd488693441e33eb8392d76d9b57a78d0d77e9080000000000000064516012857d445602af835297c84c211911e5fadece87db5a8894f36a19f7ba231dacc61ef4b8524330461a0db46abb795fdcd89a50852f130a289058c679d9b7b4a8d431960180e4c751345f328c02a8ba6c2a56d2348319f34682c1a78f12b833", @ANYRES32=0x0], 0x200}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r1, r1, 0x0, 0x401) ioctl$BLKBSZSET(r1, 0x40041271, &(0x7f00000001c0)=0xffff) r2 = open(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000040)=0x48) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000180)={@dev={0xac, 0x14, 0x14, 0x29}, @dev={0xac, 0x14, 0x14, 0x12}, @multicast2}, 0xc) read$midi(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040)={0xb0000001}) 09:13:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) 09:13:48 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000400)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10841, 0x8e10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 310.219531][T13144] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:13:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0, 0x53}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="64000000190005020000f200000000001d01098050001000df03500a2064cdab40d1bf1cb630eb9d53dca5ea48fc3810370500000000000000664f8f1eea277c1a7cc92cd400001fc1a8ac37ff0f00004000000037b0e307301b4708e7d165804f"], 0x64}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 310.297231][T13144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 310.308536][T13144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:49 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000003c0)={0x5, 0x4, 0x8002, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 310.761414][T13148] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.770992][T13148] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.799401][T13148] team0: Port device veth3 added 09:13:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f00000000c0)={0x5, @vbi}) [ 310.962232][T13147] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.972487][T13147] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.133535][T13147] team0: Port device veth5 added 09:13:50 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x20, r0, 0xf2b, 0x0, 0x0, {0x67}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x120}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) 09:13:50 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000400)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10841, 0x8e10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:13:50 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f00000000c0)={0x5, @vbi}) 09:13:50 executing program 2: unshare(0x200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x338, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x109041, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, 0x0, &(0x7f0000000040)=0x2b) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in6}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x10c, 0x0, 0x20, 0x70bd25, 0x0, {}, [@HEADER, @HEADER]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4801) syz_open_procfs(r3, &(0x7f0000000140)='setgroups\x00') r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setgid(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$snddsp(r2, &(0x7f00000000c0)=""/38, 0x26) setns(r5, 0x0) clone(0x70224100, 0x0, 0x0, 0x0, 0x0) 09:13:50 executing program 3: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100060, 0xffffa88f) 09:13:50 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88882, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x7}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000ffffffffffffaaaaaaaaaaaa08004500005800000000002f"], 0x6a) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x18100, 0x0) [ 311.597220][T13178] netlink: 'syz-executor.4': attribute type 288 has an invalid length. [ 311.658030][T13181] netlink: 'syz-executor.4': attribute type 288 has an invalid length. [ 311.675854][T13177] IPVS: ftp: loaded support on port[0] = 21 [ 311.801440][T13183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 311.890983][T13183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 311.902895][T13183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:13:51 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@broadcast, @random="c595c895f8ed", @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @broadcast}, @echo}}}}, 0x0) 09:13:51 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/dsp1\x00', 0x801, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfffffe9c) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc004500a, &(0x7f0000000000)) 09:13:51 executing program 2: ptrace(0x10, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000), 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001400add427323b472545b4560a117fffffff81004e224e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff00000001ffe7ee0000000000000000020000", 0x56}], 0x1) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001400add427323b472545b4560a117fffffff81004e224e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffff00000001ffe7ee00000000000000000200000000", 0x58}], 0x1) clone3(&(0x7f00000000c0)={0x1010a400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0xfffffd86) r2 = getpgrp(0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001740)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0xfffffffd}, @IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x10}]}]}]}, 0x40}}, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000000)=0x1) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)=[0x0, 0x2]) prctl$PR_SET_PTRACER(0x59616d61, r2) socket$inet6(0xa, 0x3, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xaa821100, 0x0, 0x0, 0x0, 0x0) 09:13:51 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f00000000c0)={0x5, @vbi}) [ 312.869444][ T229] tipc: TX() has been purged, node left! 09:13:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@usrquota='usrquota'}]}) 09:13:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f00000004c0)={@broadcast, @random="00e6231abdaf", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '.MM', 0x38, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '$\x00@', 0x0, 0x3a, 0x0, @loopback={0xff00000000000000}, @loopback, [], "050c68deb1caadea"}}}}}}}, 0x0) 09:13:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f00000000c0)={0x5, @vbi}) 09:13:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x3}}) 09:13:53 executing program 4: r0 = timerfd_create(0x0, 0x800) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xd54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}) read(r0, &(0x7f00000000c0)=""/140, 0x8c) 09:13:53 executing program 2: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @remote}, 0x1c) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00003fb000)="f7", 0x1}], 0x1, 0x0) madvise(&(0x7f000005b000/0x400000)=nil, 0x400000, 0x1000000000008) 09:13:53 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @empty}, 0x2}}, 0x2e) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0xfffffff5}], 0x400000000000085, 0x0) 09:13:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x18, 0x5a, 0x203, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 09:13:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x38, r1, 0x1, 0x0, 0x0, {0xc}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x38}}, 0x0) [ 315.315399][T13269] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 315.427566][T13272] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 09:13:54 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/dsp1\x00', 0x801, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfffffe9c) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc004500a, &(0x7f0000000000)) 09:13:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv6_getroute={0x1c, 0x1a, 0x1523, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00}}, 0x1c}}, 0x0) 09:13:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000040, 0x0) 09:13:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000240)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 09:13:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x4c}}, 0x0) 09:13:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000080)='./file1\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) llistxattr(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) [ 316.253644][T13285] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:13:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1107], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:13:55 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x22, &(0x7f00000003c0)=0x0) io_submit(r1, 0x6aa, &(0x7f0000000540)=[&(0x7f00000000c0)={0x400000000812d000, 0x9, 0x3, 0x8, 0x0, r0, &(0x7f0000000000), 0x1e, 0x7fffffffffffffff}]) 09:13:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/93, 0x5d}], 0x1, 0x5b) 09:13:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x7fff, 0x0, 0x1, 0x0, [0x13]}, 0x40) 09:13:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af00, 0x0) 09:13:56 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/93, 0x5d}], 0x1, 0x5b) [ 319.132940][ T0] NOHZ: local_softirq_pending 08 09:13:58 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/dsp1\x00', 0x801, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfffffe9c) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc004500a, &(0x7f0000000000)) 09:13:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/93, 0x5d}], 0x1, 0x5b) 09:13:58 executing program 4: keyctl$reject(0x14, 0x0, 0xfffffffffffffffd, 0x400, 0x0) 09:13:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={{0x14, 0x3f3}, [], {0x14, 0x3f4}}, 0x28}}, 0x0) 09:13:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af00, 0x0) 09:13:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1107], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:13:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af00, 0x0) 09:13:58 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x8000002}}, 0x10) bind(r1, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a000217069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 09:13:58 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) connect$unix(r0, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) 09:13:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/93, 0x5d}], 0x1, 0x5b) 09:13:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1107], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:13:59 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x8000002}}, 0x10) bind(r1, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a000217069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 09:14:00 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/dsp1\x00', 0x801, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0xfffffe9c) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc004500a, &(0x7f0000000000)) 09:14:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1107], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:14:00 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000e0000000000000000000000850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1000000, 0x1c, 0x0, &(0x7f0000000440)="37716b98ef91d5012543dd52e3d0e9d61f0004000bcf39a879207ebf", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 09:14:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af00, 0x0) 09:14:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6}]}}}]}, 0x40}}, 0x0) 09:14:00 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x8000002}}, 0x10) bind(r1, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a000217069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 09:14:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmstat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) 09:14:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x19a) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 09:14:00 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x19) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r0, 0x4) 09:14:01 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}}}, 0x10) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3, 0x8000002}}, 0x10) bind(r1, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a000217069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 09:14:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmstat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) 09:14:01 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 09:14:02 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 09:14:02 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) 09:14:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x1d, r0, 0xee01, r2) 09:14:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "a26706a60621ce88"}, 0x5}}]}, 0x2c}}, 0x0) 09:14:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmstat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) 09:14:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="390000001300090468fe0704000000000000ff3f02000000450001070000001419001a0015000a0005000800000000", 0x2f}, {&(0x7f00000000c0)="fa2151a420f40e2542d7", 0xa}], 0x2) [ 323.625756][T13415] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 323.635938][T13415] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 09:14:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmstat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xd811) 09:14:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newrule={0x38, 0x20, 0x603, 0x0, 0x0, {0xa, 0x10}, [@FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e24, 0x4e24}}, @FRA_DST={0x14, 0x1, @dev}]}, 0x38}}, 0x0) 09:14:02 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 09:14:02 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001280)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000000280)=""/4089, 0xff9) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) read$midi(0xffffffffffffffff, &(0x7f0000001400)=""/226, 0xe2) 09:14:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x5ab}, 0x28) 09:14:02 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) 09:14:03 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150005008178a8001600400001000200000094060434cf6efb8000a007a290457f0189b316277ce06bbace6617cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf639cb9dbcdcc6b4c1f215ce3bb9ad809d5e1cace81ed0be0b42affcbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000", 0xd8}], 0x1}, 0x0) 09:14:03 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 09:14:03 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@link_local, @dev, @void, {@ipv4={0x800, @udp={{0x7, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast, {[@ssrr={0x89, 0x3, 0x45}, @lsrr={0x83, 0x3, 0x40}]}}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 324.592009][T13440] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.5'. 09:14:03 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) 09:14:03 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5412, &(0x7f0000000040)) [ 324.911776][ T32] audit: type=1800 audit(1595409243.762:20): pid=13436 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16375 res=0 09:14:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x6c, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast2}}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x6c}}, 0x0) 09:14:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) 09:14:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) 09:14:04 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) readv(r0, &(0x7f0000002600)=[{&(0x7f00000012c0)=""/4095, 0xfff}], 0x1) 09:14:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 09:14:04 executing program 5: io_setup(0x83, &(0x7f00000003c0)=0x0) r1 = socket$kcm(0x21, 0x2, 0x2) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x0, 0x0, r1, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}]) 09:14:04 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5412, &(0x7f0000000040)) [ 325.484169][T13461] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 2, id = 0 [ 325.497305][T13460] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 325.506658][T13460] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 325.662443][T13460] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 325.743082][T13460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.754312][T13460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.254296][T13469] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 326.263032][T13469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:14:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x5c, 0x2, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0xa, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @private2}}}]}]}, 0x5c}}, 0x0) [ 326.327357][T13477] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 326.335823][T13477] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 326.344157][T13477] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 326.408623][T13469] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 326.426523][T13469] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.434511][T13469] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.561837][T13479] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:14:05 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5412, &(0x7f0000000040)) 09:14:05 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) 09:14:05 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$FUSE(r0, &(0x7f0000000140), 0xfffffefa) 09:14:05 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 09:14:05 executing program 2: socket$kcm(0x2, 0x3, 0x84) 09:14:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) 09:14:06 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5412, &(0x7f0000000040)) 09:14:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000200)=""/91, 0x5b}], 0x1, 0x0) 09:14:06 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nls={'nls', 0x3d, 'iso8859-5'}}, {@nls={'nls', 0x3d, 'iso8859-13'}, 0x22}]}) 09:14:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xc, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x20007, [{0x2, 0x0, 0x6}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x5f]}}, &(0x7f0000000300)=""/250, 0x4c, 0xfa, 0x4}, 0x20) 09:14:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x14, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) [ 327.597765][T13510] new mount options do not match the existing superblock, will be ignored 09:14:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) [ 327.681441][T13510] new mount options do not match the existing superblock, will be ignored [ 327.752995][T13518] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6_vti0, syncid = 2, id = 0 [ 327.797324][T13517] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 327.806178][T13517] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:14:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newtaction={0x60, 0x30, 0x3ef, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbmod={0x48, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0xffffffff}}}, @TCA_SKBMOD_DMAC={0xa, 0x3, @broadcast}]}, {0x4}}}]}]}, 0x60}}, 0x0) [ 327.946634][T13517] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 328.025886][T13517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 328.036358][T13517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 328.072206][T13507] ntfs: (device loop2): parse_options(): NLS character set iso8859-13" not found. Using previous one iso8859-5. [ 328.084371][T13507] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 09:14:07 executing program 3: unshare(0xa040400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x220002, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) 09:14:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000200)=""/91, 0x5b}], 0x1, 0x0) [ 328.449510][T13520] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 328.457918][T13520] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 328.483544][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 328.499475][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 328.509109][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 328.568397][T13530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 328.578010][T13530] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 09:14:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) 09:14:07 executing program 2: r0 = epoll_create1(0x0) close(r0) pwritev(r0, 0x0, 0x0, 0x0) 09:14:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) 09:14:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x5, 0x0, 0x0, 0x0, 0x7e}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x84, 0x0, @private=0xc0586300, @dev}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00\v\b', 0x0, '\a\x00@'}, "ccbfc12abc282c27820fd9118600820e000600110000000094ce7f17e89fb5f1112b33df4c366b67856c210a24c3df6373d0ca47aac2885da778edbd1ee5bde967a600ca0e2ba1e34aebb68aa9431063000000000000000000010000"}}}}, 0x8a) [ 328.982780][T13538] new mount options do not match the existing superblock, will be ignored 09:14:07 executing program 3: unshare(0xa040400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x220002, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 329.150193][T13544] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 329.161536][T13544] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.329934][T13544] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 329.418724][T13544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 329.430550][T13544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:14:08 executing program 3: unshare(0xa040400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x220002, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 329.969741][T13558] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 329.978492][T13558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:14:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000200)=""/91, 0x5b}], 0x1, 0x0) 09:14:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x4) [ 330.140733][T13558] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 330.224072][T13558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 330.235639][T13558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:14:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) 09:14:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x4) 09:14:09 executing program 3: unshare(0xa040400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x220002, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 330.918527][T13578] new mount options do not match the existing superblock, will be ignored [ 331.138420][T13581] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 331.146775][T13581] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 331.172870][T13581] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 331.189612][T13581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 331.198869][T13581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:14:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000200)=""/91, 0x5b}], 0x1, 0x0) 09:14:10 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000100)="ac", 0x1) 09:14:10 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x4) 09:14:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc2014, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x162, &(0x7f00000001c0)=@abs, 0x6e) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) prctl$PR_SET_PDEATHSIG(0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = creat(0x0, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, 0x0) [ 331.730275][T13594] new mount options do not match the existing superblock, will be ignored 09:14:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000100), 0x4) 09:14:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b15a123bbe8bae69f2"], 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x436, 0x0) [ 332.014958][T13599] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 332.023778][T13599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:14:10 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, 0x1c) [ 332.168383][T13599] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 332.235054][T13599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 332.244976][T13599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:14:11 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x4) 09:14:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x10, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x10, 0x4) 09:14:11 executing program 0: creat(&(0x7f0000000240)='./bus\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000080)={r0, 0xffffffffffffff70, &(0x7f0000000240)}, 0x10) 09:14:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4, 0x1a, 0x0, 0x1, [@AF_INET={0x4, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x4c}}, 0x0) 09:14:11 executing program 4: open(&(0x7f0000000040)='./file1\x00', 0x40, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000002c0)='./file1\x00', r0, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 09:14:11 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x3cb) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x48, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}]}, 0x48}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000000000000501"], 0xa) close(r2) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 09:14:12 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f0000000040)=[@acquire, @decrefs], 0x0, 0x0, 0x0}) 09:14:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x7d, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f0000000040)={r0, 0x28}, 0x10) 09:14:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4, 0x1a, 0x0, 0x1, [@AF_INET={0x4, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x4c}}, 0x0) 09:14:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)=@ipv6_getaddr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @loopback}]}, 0x2c}}, 0x0) 09:14:12 executing program 0: r0 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0xf, {0x2, 0x0, @remote}}, 0x80, 0x0}, 0x0) [ 333.556491][ T32] audit: type=1400 audit(1595409252.402:21): avc: denied { set_context_mgr } for pid=13631 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=binder permissive=1 09:14:12 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x38}}, 0x0) 09:14:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000001900)=[{&(0x7f0000000880)="b19462c33f5d8115ec7c43c924cb91c04ab79a9d9abe98033e3295eebff7f4b93ac52a7368d1be44dc0e346c21e220fa44fde347ffb59892f2c771e24d4c7e6160356492dc21a4f94e67be791ec34221e762cd0f50ebc08b56475a9a3d7b2c10a61673255ee1dd14e0bf57bf2bfebd301941e2b3259c1506b98db698f5c9b31995", 0x81}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000080)) 09:14:12 executing program 2: connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xd5, 0x0, &(0x7f0000000080)) 09:14:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4, 0x1a, 0x0, 0x1, [@AF_INET={0x4, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x4c}}, 0x0) 09:14:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000040)=0x80000000002, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x40) ftruncate(r1, 0x40) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000040)) 09:14:12 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000fff9) 09:14:13 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047437, &(0x7f0000000080)) [ 334.251538][T13660] SELinux: Context G0: system timer : 10000.000us (10000000 ticks) [ 334.251538][T13660] G3: HR timer : 0.001us (1000000000 ticks) [ 334.251538][T13660] P0-0-0: PCM playback 0-0-0 : SLAVE [ 334.251538][T13660] P0-0-1: PCM capture 0-0-1 : SLAVE [ 334.251538][T13660] P0-0-2: PCM playback 0-0-2 : SLAVE [ 334.251538][T13660] P0-0-3: PCM capture 0-0-3 : SLAVE [ 334.251538][T13660] P0-0-4: PCM playback 0-0-4 : SLAVE [ 334.251538][T13660] P0-0-5: PCM capture 0-0-5 : SLAVE [ 334.251538][T13660] P0-0-6: PCM playback 0-0-6 : SLAVE [ 334.251538][T13660] P0-0-7: PCM capture 0-0-7 : SLAVE [ 334.251538][T13660] P0-0-8: PCM playback 0-0-8 : SLAVE [ 334.251538][T13660] P0-0-9: PCM capture 0-0-9 : SLAVE [ 334.251538][T13660] P0-0-10: PCM playback 0-0-10 : SLAVE [ 334.251538][T13660] P0-0-11: PCM capture 0-0-11 : SLAVE [ 334.251538][T13660] P0-0-12: PCM playback 0-0-12 : SLAVE [ 334.251538][T13660] P0-0-13: PCM capture 0-0-13 : SLAVE [ 334.252552][ T32] audit: type=1400 audit(1595409253.102:22): avc: denied { mac_admin } for pid=13655 comm="syz-executor.0" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 09:14:13 executing program 2: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @multicast1, @multicast1}, {{0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, "3debb0", 0x0, 'Ps:'}}}}}}, 0x0) 09:14:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4, 0x1a, 0x0, 0x1, [@AF_INET={0x4, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x4c}}, 0x0) 09:14:13 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @none}, 0xe) 09:14:13 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000fff9) 09:14:13 executing program 4: r0 = socket(0xa, 0x80005, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 09:14:13 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xfffffff7, 0x0, @value}) 09:14:13 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000fff9) 09:14:13 executing program 1: syz_emit_ethernet(0xa0, &(0x7f00000002c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x6a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a82502"}, {0x0, 0x1, "00000000000095e397bfbc6c"}, {0x1f}]}}}}}}, 0x0) 09:14:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/59, 0x3b}], 0x1, 0x0) 09:14:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f80)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x0) 09:14:14 executing program 5: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x82, &(0x7f0000000040), &(0x7f00000001c0)=0x14) 09:14:14 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xfffffff7, 0x0, @value}) 09:14:14 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000fff9) 09:14:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x2}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0xf98, 0x3a, 0x0, @empty, @mcast2, {[], @pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "ee2d95", 0x0, 0x0, 0x0, @private1, @loopback, [@dstopts={0x0, 0x0, [], [@padn]}], "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"}}}}}}, 0xfca) 09:14:14 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x1c, r0, 0x427, 0x0, 0x0, {0x1a}, [@ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x1c}}, 0x0) 09:14:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/59, 0x3b}], 0x1, 0x0) 09:14:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x406855c9, 0x0) 09:14:14 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xfffffff7, 0x0, @value}) 09:14:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) connect$l2tp(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 09:14:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) uname(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f00000000c0)={0x9, 0x9}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000100)) ioctl$KDENABIO(r2, 0x4b36) 09:14:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x406855c9, 0x0) 09:14:15 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xfffffff7, 0x0, @value}) 09:14:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/59, 0x3b}], 0x1, 0x0) 09:14:15 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xf9, &(0x7f0000000140), &(0x7f00000000c0)=0x4) [ 337.135887][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 337.228407][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 337.241924][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 337.256435][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 337.271239][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 337.284734][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 337.299325][T13721] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 09:14:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {0x4000000}]}]}, {0x0, [0x5f]}}, &(0x7f0000000300)=""/250, 0x37, 0xfa, 0x8}, 0x20) [ 337.654286][T13743] BPF: Invalid name_offset:67108864 [ 337.672151][T13743] BPF: Invalid name_offset:67108864 09:14:16 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:14:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x406855c9, 0x0) 09:14:16 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, 0xffffffffffffffff, 0x0) 09:14:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/59, 0x3b}], 0x1, 0x0) 09:14:16 executing program 3: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0103000000000000000003000000200001"], 0x34}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) 09:14:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) uname(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f00000000c0)={0x9, 0x9}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000100)) ioctl$KDENABIO(r2, 0x4b36) [ 338.393883][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:14:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x406855c9, 0x0) 09:14:17 executing program 3: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0103000000000000000003000000200001"], 0x34}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) [ 338.675587][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready 09:14:17 executing program 0: unshare(0x6000400) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) [ 338.786976][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 338.920283][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 339.024539][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 339.138773][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 339.248612][T13755] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 09:14:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece4006a, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x40003663}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1) 09:14:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x9c}}, 0x0) 09:14:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) uname(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f00000000c0)={0x9, 0x9}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000100)) ioctl$KDENABIO(r2, 0x4b36) 09:14:18 executing program 1: unshare(0x40600) creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x325802, 0x0) timerfd_gettime(r0, 0x0) 09:14:18 executing program 3: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0103000000000000000003000000200001"], 0x34}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) 09:14:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010025081000418e00000004fcff", 0x58}], 0x1) [ 339.988891][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:14:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece4006a, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x40003663}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1) [ 340.168675][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready 09:14:19 executing program 5: r0 = add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000003c0)=""/122, 0x7a) [ 340.242644][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 340.314807][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 340.383881][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 340.455727][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 340.515462][T13782] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 09:14:19 executing program 1: capset(&(0x7f0000000800)={0x20080522}, &(0x7f0000000840)) ioprio_set$uid(0x3, 0x0, 0x0) 09:14:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x49249249249265a, 0x0) 09:14:19 executing program 3: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0103000000000000000003000000200001"], 0x34}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) 09:14:19 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 09:14:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece4006a, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x40003663}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1) 09:14:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) uname(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f00000000c0)={0x9, 0x9}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000100)) ioctl$KDENABIO(r2, 0x4b36) 09:14:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x103) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080), 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@local, 0x800, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmsg(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}], 0x10}, 0x0) 09:14:20 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_KEY_FLAGS={0x8}]}}]}, 0x3c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 09:14:20 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x3, 0x6, @link_local}, 0x10) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce8750500ff5f163ee340b7679502800000001600000101013c58110308d9123127ecce64fd792bbf065bf5ff1b0816f3f6db1cfc000000000000000049740000000055000006ad8e5effc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000400)={r8, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r6, 0x107, 0x2, &(0x7f00000003c0)={r8, 0x3, 0x6, @broadcast}, 0x10) 09:14:20 executing program 0: ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000100)={0x0, [[], [0x0, 0x0, 0x0, 0x3529]]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 341.559134][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 341.734785][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 341.807857][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 341.879079][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 341.945068][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 342.006681][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 342.082356][T13813] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 342.097741][T13822] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 09:14:21 executing program 3: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="240000001a0089f0003be90000ed190e020008160000100000ba108008001d007f196be0", 0x24) [ 342.216814][T13834] device lo entered promiscuous mode 09:14:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece4006a, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x40003663}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) writev(r0, &(0x7f0000001240)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1) [ 342.288041][T13822] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 342.323113][T13818] device lo left promiscuous mode 09:14:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) [ 342.524999][T13834] device lo entered promiscuous mode [ 342.553800][T13835] device lo left promiscuous mode 09:14:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}, 0x0, 0x0, 0x3, 0x1}, 0x20) dup3(r0, r1, 0x0) 09:14:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="18020000000000000000000000f4000085000000200000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x4f, &(0x7f0000000100)="7f3d5e7a9e3efa339e3c7b7f07d2", 0x0, 0x740}, 0x28) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) io_submit(0x0, 0x0, 0x0) 09:14:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x7ff, 0x54, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x19, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 09:14:21 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}, @TCA_HHF_QUANTUM={0x8}]}}]}, 0x40}}, 0x0) 09:14:21 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYRES16=0x0, @ANYBLOB="00000000000000000000110000002c00038008000200aa6c392830ed33c7000000000800020000000011080002000000160008000200000000000800010000800c0001006574683a776731002400038008000300000000000800010000000000080003000000000008000100000000003000058008000100756470001c00028008000200000000000800019e00000000080002000000000008"], 0xa4}}, 0x0) pipe(&(0x7f0000000040)) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 343.001221][T13855] IPVS: ftp: loaded support on port[0] = 21 09:14:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}, 0x0, 0x0, 0x3, 0x1}, 0x20) dup3(r0, r1, 0x0) 09:14:22 executing program 0: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r0}]) 09:14:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x800, 0x9, 0x500}, 0x3c) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 09:14:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}, 0x0, 0x0, 0x3, 0x1}, 0x20) dup3(r0, r1, 0x0) [ 343.971993][ T32] audit: type=1804 audit(1595409262.822:23): pid=13901 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir771636562/syzkaller.xzHMpP/232/bus" dev="sda1" ino=16383 res=1 09:14:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) [ 344.082412][ T32] audit: type=1804 audit(1595409262.882:24): pid=13904 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir771636562/syzkaller.xzHMpP/232/bus" dev="sda1" ino=16383 res=1 09:14:23 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000100)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x2, 0x0) [ 344.598071][T13913] overlayfs: overlapping lowerdir path [ 344.621325][T13915] overlayfs: overlapping lowerdir path [ 344.847102][T13855] IPVS: ftp: loaded support on port[0] = 21 [ 345.331818][ T229] tipc: TX() has been purged, node left! 09:14:24 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bind$inet(r1, 0x0, 0x0) 09:14:24 executing program 3: unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01"], 0x2000, 0x0) msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='!'], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 09:14:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000100)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x2, 0x0) 09:14:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @multicast1}, 0x0, 0x0, 0x3, 0x1}, 0x20) dup3(r0, r1, 0x0) 09:14:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @private2}]}}}]}, 0x4c}}, 0x0) 09:14:24 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:24 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x701f81, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0}, 0x44e716d1}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 345.875023][T13963] IPVS: ftp: loaded support on port[0] = 21 09:14:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x22, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x210, 0x160, 0x0, 0x160, 0x160, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xa0, 0x8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3) 09:14:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000100)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x2, 0x0) 09:14:24 executing program 2: r0 = socket(0x2, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="cf", 0x1, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000000700)=""/183, 0xb7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) [ 346.083955][T13967] IPVS: ftp: loaded support on port[0] = 21 09:14:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x121402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000080)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0x24}], 0x2) 09:14:26 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:26 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000440)={0x0, 0xfeffff, 0x0, 0x0, 0x0, 0x0}) 09:14:26 executing program 2: r0 = socket(0x2, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="cf", 0x1, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000000700)=""/183, 0xb7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) 09:14:26 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000100)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x2, 0x0) 09:14:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x121402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000080)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0x24}], 0x2) [ 347.839005][T14036] binder: 14031:14036 ioctl c018620c 20000440 returned -22 09:14:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x121402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000080)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0x24}], 0x2) [ 348.091621][T14043] IPVS: ftp: loaded support on port[0] = 21 [ 348.574038][ T229] tipc: TX() has been purged, node left! 09:14:27 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:27 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0xfffffffffffffd81, &(0x7f00000038c0)=[{0x0}, {&(0x7f0000000180)=""/22, 0xe}], 0x2}}], 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fe", 0xfdf5}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}], 0x1f8, 0x122, 0x0) 09:14:27 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000440)={0x0, 0xfeffff, 0x0, 0x0, 0x0, 0x0}) 09:14:27 executing program 2: r0 = socket(0x2, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="cf", 0x1, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000000700)=""/183, 0xb7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) 09:14:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x121402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000080)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0x24}], 0x2) [ 348.752085][ T229] tipc: TX() has been purged, node left! [ 348.803684][T14077] binder: 14073:14077 ioctl c018620c 20000440 returned -22 [ 348.908208][ T229] tipc: TX() has been purged, node left! 09:14:27 executing program 2: r0 = socket(0x2, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="cf", 0x1, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000000700)=""/183, 0xb7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) [ 349.040336][T14082] IPVS: ftp: loaded support on port[0] = 21 09:14:29 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b6a, &(0x7f0000000000)='_') 09:14:29 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000440)={0x0, 0xfeffff, 0x0, 0x0, 0x0, 0x0}) 09:14:29 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$NBD_DISCONNECT(r0, 0xab08) 09:14:29 executing program 2: membarrier(0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001340)='/dev/qat_adf_ctl\x00', 0x400, 0x0) getsockname$packet(r0, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0xc0648d0}, 0x880) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @dev}]}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) [ 350.436014][T14121] binder: 14116:14121 ioctl c018620c 20000440 returned -22 [ 350.470950][T14122] block nbd5: shutting down sockets [ 350.506651][T14122] block nbd5: NBD_DISCONNECT [ 350.511745][T14122] block nbd5: Send disconnect failed -32 [ 350.569428][T14122] block nbd5: shutting down sockets [ 350.580683][T14128] block nbd5: NBD_DISCONNECT [ 350.586035][T14128] block nbd5: Send disconnect failed -32 [ 350.630790][T14129] IPVS: ftp: loaded support on port[0] = 21 09:14:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b6a, &(0x7f0000000000)='_') 09:14:29 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/if_inet6\x00') lseek(r0, 0x8, 0x0) 09:14:29 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000440)={0x0, 0xfeffff, 0x0, 0x0, 0x0, 0x0}) 09:14:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6}, @IFLA_IPTUN_ENCAP_SPORT={0x6}]}}}]}, 0x44}}, 0x0) 09:14:29 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$NBD_DISCONNECT(r0, 0xab08) [ 351.168346][T14158] binder: 14155:14158 ioctl c018620c 20000440 returned -22 [ 351.227272][T14161] block nbd5: shutting down sockets [ 351.280208][T14162] block nbd5: NBD_DISCONNECT [ 351.285248][T14162] block nbd5: Send disconnect failed -32 09:14:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b6a, &(0x7f0000000000)='_') 09:14:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)={0x24, r1, 0xc694d42685586125, 0x0, 0x0, {0x2}, [@GTPA_VERSION={0x8}, @GTPA_LINK={0x8, 0x1, r3}]}, 0x24}}, 0x0) [ 352.201097][T14164] IPVS: ftp: loaded support on port[0] = 21 09:14:31 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="640000001900050200000000000001001d0109e04f0011"], 0x64}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="68020000010500000000000000000000000000005402010000000000000000007f"], 0x268}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 09:14:31 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x1}, 0x8) sendmmsg$inet6(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2d, 0x400d0c5) sendmmsg$inet6(r0, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)='2', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)="b3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000c00)="99", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000001100)="d9", 0x1}], 0x1}}], 0x4, 0xc802) write$binfmt_misc(r0, 0x0, 0x0) 09:14:31 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$NBD_DISCONNECT(r0, 0xab08) 09:14:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="8c0000002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000080000000d0001006d61746368616c6c00553c005800020054000200500001000800010062706600280002"], 0x8c}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) 09:14:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b6a, &(0x7f0000000000)='_') [ 353.185708][T14208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=14208 comm=syz-executor.2 [ 353.197731][T14210] block nbd5: shutting down sockets [ 353.205524][T14209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.252058][T14216] block nbd5: NBD_DISCONNECT [ 353.257001][T14216] block nbd5: Send disconnect failed -32 [ 353.285736][T14217] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.295395][T14217] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.396714][T14220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=14220 comm=syz-executor.2 [ 353.431305][T14223] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.469789][T14217] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.480352][T14217] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 09:14:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="18c4a20ea186"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) [ 353.630753][T14217] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.633610][ T229] tipc: TX() has been purged, node left! [ 353.640859][T14217] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 353.782317][ T229] tipc: TX() has been purged, node left! [ 353.934565][ T229] tipc: TX() has been purged, node left! 09:14:32 executing program 2: r0 = memfd_create(&(0x7f0000000540)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb\x12\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9.a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\x96\xb89\x88\xef\xe4U\xc6\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\xff\xff\xff\xff\xb8(\xbe\x98\x1e(o\xec\xda\x94\x93\xb7c\x86\x98\x8a\xff\xb0x\xbfWv\x02H{b\x8ev', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150b", 0x23) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 09:14:32 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$NBD_DISCONNECT(r0, 0xab08) 09:14:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="18c4a20ea186"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) 09:14:32 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@random="4151855b7cba", @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x10, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x88be}, {}, {0x0, 0x0, 0x0, 0x0, 0x11}}}}}}}, 0x0) 09:14:32 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000eedffc)=0x7fe, 0x4) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x5, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 09:14:32 executing program 0: unshare(0x2a000400) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) [ 354.180271][T14242] block nbd5: shutting down sockets [ 354.185525][ T229] tipc: TX() has been purged, node left! [ 354.205470][T14239] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 354.243583][T14243] block nbd5: NBD_DISCONNECT [ 354.248498][T14243] block nbd5: Send disconnect failed -32 09:14:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="18c4a20ea186"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) 09:14:33 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x6500, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x9) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 09:14:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)={0x14, r1, 0x31905e13403123b7, 0x0, 0x0, {0x5, 0x0, 0xf000}}, 0x14}, 0x1, 0x50000}, 0x0) 09:14:33 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) setuid(r1) 09:14:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 09:14:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000580)='sysfs\x00', 0x0, 0x0) listxattr(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)=""/157, 0x9d) [ 354.828318][ T32] audit: type=1804 audit(1595409273.682:25): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir343970211/syzkaller.V8xldP/199/bus" dev="sda1" ino=16375 res=1 [ 354.853296][ T32] audit: type=1800 audit(1595409273.682:26): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16375 res=0 [ 354.873967][ T32] audit: type=1804 audit(1595409273.692:27): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir343970211/syzkaller.V8xldP/199/bus" dev="sda1" ino=16375 res=1 [ 354.899575][ T32] audit: type=1804 audit(1595409273.742:28): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir343970211/syzkaller.V8xldP/199/bus" dev="sda1" ino=16375 res=1 [ 354.924034][ T32] audit: type=1804 audit(1595409273.762:29): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir343970211/syzkaller.V8xldP/199/bus" dev="sda1" ino=16375 res=1 [ 354.948781][ T32] audit: type=1800 audit(1595409273.762:30): pid=14260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16375 res=0 [ 354.969384][ T32] audit: type=1804 audit(1595409273.772:31): pid=14264 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir343970211/syzkaller.V8xldP/199/bus" dev="sda1" ino=16375 res=1 09:14:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="18c4a20ea186"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) 09:14:34 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000680)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0x1279, 0x0) 09:14:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@setlink={0x40, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @empty=[0x4]}, @IFLA_IFNAME={0x14, 0x3, 'macsec0\x00'}]}, 0x40}}, 0x0) 09:14:34 executing program 3: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000180)=',\x13\xda\xf9\x81F\xeet~p\xe5\x1d\xa9Sn\xa2\xf9\xda`gLv\x01\xa1\xdf\xc5\xca\xc9un\x05\xba\x97\x86\x83\x1an\xb1\n\x94\xf4\xca\n!\"\xcdn\xf2\xd3o\x0e\xe5\xd7\x16\xe0\xdcs\xf6P>\xd4\x15\xb44\xf8\xbemc\xc5\xc5\x19L\x9a:?n\xe6\x16\x9d\x97\xafC\xa6:\xa5\xf7\xe8X\xc7x,\x87\xddN\x90\xce\xc5\xec\xf1\xb8;\xf6\xccT\xb3H\x95\x87\x8a\xe4\x81\xc8\x88\\\xd2,w\xdd\x05\xden\xf3\xc8y=X\x7f\x85\x97Q\x9er\xe3\xc4\x8e\xb7\xd8ulr1\x12\xbfF\xf6\x840\xaag\xc8\xb5?\x87\xd1E\xdf\xde\xce\xcap\xe7\xbe\x8d \x04\xa3\xbfN*\xe4\xb2YGW\x884\x01J\x9e[>j!2]\x9aXq\xe2\x824F\xd0_P\x86\xb1\xca\xe3\xe0\xd7\x90\xd8\x87F\xbd\x8d\xf7SF\xe1\x9d\xe5\xee\x185\xda\x8b1\x88\xb3\x85w~\x8b\x87\xf4\xd9\xb7#\x8e\x98\xc2\xa5\x00\xc5\x8cW@o+\xa8#\r\xf2\x93\xf7\xb9E]\x99', &(0x7f0000000100), 0x0) 09:14:34 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 09:14:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x46}, [@call={0x27}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 09:14:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) setgroups(0x0, 0x0) 09:14:34 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000107010100000000000000000000000014000780080001400000000008000240df"], 0x28}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 09:14:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2}, 0xc) dup2(r0, r3) 09:14:34 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x15, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0xb) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r4, 0xffffffffffffffff, r3, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x0, 0x882200}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x100, 0x0) fdatasync(0xffffffffffffffff) 09:14:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x8, 0x4, 0x4, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 09:14:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}]}, 0x34}}, 0x0) 09:14:35 executing program 0: semctl$GETALL(0x0, 0x0, 0xd, 0x0) 09:14:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2}, 0xc) dup2(r0, r3) 09:14:35 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x15, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0xb) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r4, 0xffffffffffffffff, r3, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x0, 0x882200}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x100, 0x0) fdatasync(0xffffffffffffffff) 09:14:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x8080aea1, &(0x7f0000000280)={{0x0, 0x0, 0x80}, "be77f645fa0faab4173328e03e0e9f020bbc798c84be65bf762199e269b6d15af3d542e5a531a895866fbf13910d95e922d6aa84d68924efe5e444b34d9df08a868ae23c677546798d6ec2c17d6e3f87f0d757c2078c9325c641fea9938ba4f20ebb2577f51ba467d973398c7fa94be4e2abd427b7ad4385c63e630090759c2a6c768a973d0b1e7244e494d5925d9d9f40afd544b84d1fdb8de7af279d8700739c11327a76f8bc32743c959d8858b276c211222f4020c56f6257be84ddd07b20d8b1de9b5390ba5eaa289c0bfdf6b5636b7acfac5159e2e7759338e06ae00e4b7cf162e45442e3c8395858847e3e28da4ed237027cd849991ab91e6e5dc61b9936de574c3b26a2b0e303386c02ed1bb6a5acaf8a9271e196bc59fb3d7d6a88383d53302680fd8ebd0e75fa67333a6fb9da0333d6f87b3f628136a4b9ec1c2f4cf3d5ec900ec17d48e3f741860d963ec6e629243d06b547374ec3f5a0a8e71cdd67e8f591d68711ba4df1f2fc62d9f54c6f7b8844c8ce569fb7f983a631250e77374780413ab37235afdefb70572e79f35d36406aded61bcf76711aacf325b2ac1f78b4ede1239e36d5d644c7a81cdf6b95a1e3aa6c2f70d889654572d1f88f05e5b2c5f5c37d6570102c2525a9b3fa28a88c83ded573a896239900bd365dc0323d4921c3c96a3dae810479a1ac83b64f0f9b2008eb51832bce90105dab379b3d99f6761d4cf438d92356c563c982938fe83026258aad0a7d9f5eacfa359c68ec271d3ecf9a57d3eec56cb0bcf1bb0adc6c297d6e5b101640d3c5b50bcb54faebed4f850e737b5a2837054bccbecfd1c28e70a967a350d21867ea95b2cdfe55fd3edc6e1f4db06a5e6b77a333af48e92899e074794f3b4687dce6d45cb33433e922b1602e767164dc0e760d14b4c70f304de2cb56ca5ea35719f492480e48b9007e4073a8e02450a93d3932971b32aca283773bbb7974486478d380d8524c0eee27ba19d9c51196494bc3f2c41c1ddc72b0b9d97ca307022baf742cb69b45de669e3224c1eaf4e6ec7bb76f921ad3fd01e1138eda10e945ca95302c1729adf6526041169700a783f767632e99b55eae5e4ebc25b63e11649a31e1dba33445a36b40c7cc7ab6450cb4853c69a9f1eb00d466f6c98f297d3e4882fd4d1a9dff0786cece0dd1b03fd84f982b493349f32e49be255102e7bd1475e25574a992da6907a0e6bce48d4601b51ca05798a0e8b5faa9ed6700902e4626b866b4219e3880277bca07f577def954fdd64e089622ed0eec558759a9b6d3e512b330fa30e31403053a73da1747a7874f5b7a9fde4c0f9f29a27e795e275c9f6c33d9db7f370f148a790811428b2f96566bd0e2b148997e69b0ffe1a81cb04d43ce6a24ea2a9414b930fa1330153cb20aaae484e515393b9ddf9d029806c35d5e956462b7cc7f1c7995006ffeae1f1ba1daf8d43309198bf444ec82c670800d5dacd600924564931014b1e834a38274c6560784572e6d4bf8c4a5a1ee5edb2f4ea5fa9f07b11d3d1d88b993fa662bc04dfb9ffa9e534f1622efd7f823346aa7e0a988f56be531c73f34439df61f9737cca8b93d2c25695138c70c469298c3a114c89a8c3409d4dc18e7bd0158631d0b936823a6dda814ed50f83862058d1ecc19b2e1195c910edb5e7164fbd403de0beb5d7feec901a5a373afa1162be95f0e71e50d479e33494d7c98c1cb2ac886c81610678923685fa9f5fff2584c89130b7d2ac78317e531bb2fcade76520cf8bec450e31eebfa5ae2f78587c572d36d56a69cf3f2cc9e15b77c11877d27e8af0196902d7f94646f0294b4507ae4461397ef21b24a2142f740460e1eb1935cbaccd14f71f21d6fb7144de99154f037cf31e9f30da3c935950c7d1c859096d44b57e7bd37147304b2fe51ab63ca7c4031c1f07913c8a894a6b0573886d7a0a62cd20a0f433e541a43808465eb82af5bb9c819a74bed83cf91aa180442c28b9f4d69dd7e728c7734dd3bd3e277e67e96ab9f09e083c0a6e42fe2bc5dcae9a2deddb7f763e62b0d8adacc00af734bb9e978c160600611c83309468a2f942f5d2c9f7cafc97dae2f542ef33be39952fa70ee3e2ecb3105c1a490db73fcf46a3645de10e1cb335ea604f41d10b723872c26f20a71f44b1301fffd601c6a609e0d195bbcb1203cd23fdb3e3f59fa8ae5a484881c34706bacb6a479fa7c9cc6920613dd6903bf046493bac060f046efc6ce43aafe9a3b735c1cb283714548fdc16a2ce9d9dccd77f3b8037132ec1b1f1d965932a9ec4b20efe1f2212c94511b61799b5bd29be84e47d1c1209af544bb4c4820b4897fe00fd583b8ae5394354d1f2532d0801f202ba31bf01a896ebea5302167cf9b0ed71e793d9572fac48d75724caa57f99ba9db2113f5fa52d19356ed1d0c85bd60805952113e521a01444d6a6a502144691a9d32363284410e967626c720cdb3444a56b1b7043047dbf8e5f1b5177c82a651710eaed591e1d4ac5ffaf85411f7c3c3e58fefb5e0528f74b3f78a0b31de68f1e31415a7a37010be818b886c28cca1bf68db068929bad71bc6b4ae2a4c9f2c9bf98f15164e6ef96ef4121c191e5a94ca431b49c475f02acebc42d2c6026e4f7d595e5677947bf6cc0d6f95d7838f76cfc04492cebaed4374984706465ac83a1acbb55450f5b5e1e4cc00a88c334af44d337089c80167a813f54fa903ec85d8f1d22c443bcdfb3d268a3e57f563b9732cc3f5d8b1fd98a6f44e3b056cbeb65946ec917ef093c3a62757f2b27e6b4873ae7183b5b9a6528a576af69449df90cda4bfad6c54bed67fecc6fdc624183aecb5072002c8dc9d45505901c61489ab31b7d6cde6943f042953df648861b68663291117f3deb74d3f9e9501d9d50b095baaeef21aca82e00203c06ce103cc923e6f02ab481eed2da0a4eedeb827e9d7961f6d972f347c649e706dc0259d697a6a5ea1ba33a6f2c16beed92b58fa290026c728e91f3de285a74e56e968c5d174639a915b5e53d7b1e5566b1a89f09434afb2a2ff1fd00d13e7ce5a3dcb8e628f39a6c6825acd4b7152a777d21485f6360af8b1c62a4a29f2ad98d9c393530187c14b4defdfc8ac12433be7f56a40ce4087eb1f7cf949e4e9b3c612e4953716ab027a36ce839f1d2815c289d08e0e500630c2f54344d6549b9645a4b31648d25f71dc7a43651aa8530ccd0cec2f96a4385b185823111c514b5beb817a6995b098824f301462598f03919ec52c0fdf5a522f3e4b250ded3089e0958bb20e5f936c8ab4fc00316ce483254f6e2abc024835acdba239decc60fcc316cbb5fe85db2e22ecd1259c607b575d836222d7a21f0fccdc6d4f90c487c66dcbe9d17f6af2edc30b57189f009072fa5b46e1f49aa33a6546aea60202c4e77066e2f487b2bd36f3178ea888488ae52fad830868172d8f2b3335db98a83c45e047ba93eb32e08a014d13fb8b9f3b54c16adaac8a95c250051baaa3667343a3df51ab7dccedcf4410482fb24ab337285d4c0d182bf00050c5cd2f8a1f7954fe0ce1c2325dc159445464327f0c463dfdae8c944db603ceab504409be7e3316e679960b63e1935018641f0d30d40fb4f83faa2786e7284b0adf6fe0ae04f61c362be89177aa7a27cd00a1c101deb33fbae04b8b20fceeef601049626954f0436470eb4d344fd53c34eab4fca401bb6aa64c1d1891ca88300ce5f8b9b7badb64a5aa3ce8ea848e288239def4602e4812c66503ccc2a68b734d97b2fe71e321e09275bbc727e4c02ce1a967f2f7c5f02f658c5e449a1c718a535561afbddd05ad28559c6ea8a5d19298eeccee69818b69a833b972128e153306522a3733396e25e3a2175443715b0926ea967609f73e2529fa4b6c346e61227ff7b2474f8257c71ff6b789d9a78e8039f78c5089586aeba7a584b3d6b753f8633d062b5cca3639eb95885027a1b78a90f79d33e8872b455a21618b76a4afd3d704849b067ab8f968bf528fbdbdfdd34e84163d644e211e32f9b5b91f86fb815890f6e405d7324fd6ff84fea268cf4d613d8b8cc784fd434f317dd77ccaf40d974c43d70ec15306c691ce9782267b20b35c150c1c104adff5437068f7c9dee058c08403024e5ed1f35bf1b6db213af8fd0293b230ddc7a405e1e3e584292cf6d9bd4ca1d0c325ecf37c57134320f79fac3f26874b1d595d0aacb7bf454bc4e15f755c1c7e2d0951d7731d8bf27c8002f611a942d633c9e0203ee9f848de15966e6c993d790bbc26958fdc3ff4e62b971697855ad0980d3cf6cd79c0f2f0d41eab6d2c67e83295afcbee60179e0997ddf9b15002b7fc058afa567034dabc640790aba2419a5ccbce25abccde586373f4e31f3436e5bab2e156b4cd6abaadbd4e991cb4a15cdea2202b13bce716e1df40d6bcc275f14c152ffe6294d2b5a5377a9da546490afa9ae4bde63de1b80f1b0d72b75a74ac1e764c4670b9547faa728500233dc410132d800bddd4e81272f1ace1fa8186e1b68e19b23ee611b2c9119b094764fd0720212c14f12f1835596660e08dbaf1a28c2ecb391094e8decb500484a4f9de412781fe084695a243d474471a3d6abd4ac640cfb7da40e0327defce9aa8101a25f7145b55db0510dd090af63fd65f9003693b21b2f3d4775c65707fed78474238d6453592933b2265c3836d0c775b95e9739b3de3856072a5b43c9e3024e8843b2522e92d12aab4a636c68af12722ab38d881f4c97118014db986f3ec966783b93d81d1d70e3ea611482df745256c3ef9c6c949c6afc6929f69d9427ddde81f3f278500c586b3bb736c2fc7713ad92ed13640f4051e72b38568e3f211f75261ee6517de0b980076127d7dc00a1660a11232325f7ac097f46e0ef4493cd7de875d14056419373d887a821672d894d32c810464705e92c9abe32967fead2464c8b2f693f45d07a8160f59ec046019b016ee8b07764278af8c6b22b4cc079f406c0ba898332aa8911b026c75edd02d5a40f8ed9c1a3d39c1893a0affe4b38c77305429562e9d0907179753051cbf13ff936091334fe24a53816d2aa5e2e26993dac3f2c573b0001152ee26b633afd966bfb704054227160bf292bbcc35f78a649bb7f4fe1783a6b10de778519c8a71f1381cc67a779e51ce3097e666d964728d55708e76953826c7659c3647d3f3cedf9f1b45b27f5735bb8d78d874bf73147b738b9c0566a0d2fdcb17f85dc712462e381ba1466d92d903ba24d0cc17ddbeb7bd80b5525d7236a8add54d4eca06fe4cd0d3724403c7ad09f22eb2fcb4181eddde271be821579b7382bbfe36dab5079811e62842da65165c27c181dfed279d5ec12a1c0c13541760c2fe5cce95c6892622229ac24a7211ba43e513077f34342b61611a1ab10b6c51f6e3a06be0716d7d1abc82f5903e32f1e6e3e85789c1b8f140bbe1903b9677ec9655e171bf1f4d27dda003c27d4ef0e043d0def451dbc0f48cb6cb605b1e2d27e9fc9db10c0b571b6805f316b00b581d0d7358f83e14d1b4290e61fc0d0bd97334f31a547350c00877c90bcb591b98986c19d9d477f7dc521ac43d2edf9201ea61c43e6365e795bfb44b0d90ced7b9d34a849dec495d79cae7769c721d7cd17f150352c7113c49fcb18449ff180d39c94717ae8fcba7ee1d8cf75873098a7a697d5f5d7a6eeef14daf146710ee40c94ff8ea9ff048d108688776fd074e72658d6ea43f42ea03883f70f45c7b86d3eb0bced0f3a60b6da510833728ffdb82af9a34c5fc86e0130861ac66c68b7843", "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"}) 09:14:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000180)={'bond0\x00', @ifru_names='veth0_to_team\x00'}) 09:14:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) pwrite64(r0, &(0x7f0000000400)='N', 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001, 0x10012, r0, 0x0) r1 = socket(0x1e, 0x5, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), 0x4) 09:14:36 executing program 2: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 09:14:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2}, 0xc) dup2(r0, r3) 09:14:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x1e0, 0x0, 0x118, 0x3e020000, 0x0, 0x118, 0x14c, 0x1d0, 0x1d0, 0x14c, 0x1d0, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @common=@unspec=@STANDARD={0x24}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x23c) 09:14:36 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:36 executing program 0: clone(0x40102080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:14:37 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x15, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0xb) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r4, 0xffffffffffffffff, r3, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x0, 0x882200}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x100, 0x0) fdatasync(0xffffffffffffffff) 09:14:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) [ 358.217090][T14339] IPVS: ftp: loaded support on port[0] = 21 09:14:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2}, 0xc) dup2(r0, r3) 09:14:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:38 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000100)=0x2e4, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x15, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0xb) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r4, 0xffffffffffffffff, r3, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000000)={0x0, 0x882200}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x100, 0x0) fdatasync(0xffffffffffffffff) 09:14:38 executing program 0: clone(0x40102080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 359.551427][T14399] IPVS: ftp: loaded support on port[0] = 21 09:14:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:39 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r1}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:39 executing program 0: clone(0x40102080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3c) r1 = inotify_init1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 09:14:39 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r6, 0x20008) 09:14:39 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) [ 360.835948][T14446] IPVS: ftp: loaded support on port[0] = 21 09:14:39 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r6, 0x20008) 09:14:40 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r5, r6, 0x0, 0x4000000000dc) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r6, 0x20008) 09:14:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) [ 362.321262][T14491] not chained 10000 origins [ 362.325829][T14491] CPU: 0 PID: 14491 Comm: syz-executor.2 Not tainted 5.8.0-rc5-syzkaller #0 [ 362.334509][T14491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.344576][T14491] Call Trace: [ 362.347879][T14491] dump_stack+0x1df/0x240 [ 362.352223][T14491] kmsan_internal_chain_origin+0x6f/0x130 [ 362.357961][T14491] ? kfree_skb+0x2b9/0x320 [ 362.362390][T14491] ? llc_sap_state_process+0xb2d/0xd10 [ 362.367862][T14491] ? kmsan_get_metadata+0x11d/0x180 [ 362.373069][T14491] ? kmsan_set_origin_checked+0x95/0xf0 [ 362.378630][T14491] ? __local_bh_enable_ip+0x97/0x1d0 [ 362.383922][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.389023][T14491] ? kmsan_set_origin_checked+0x95/0xf0 [ 362.394555][T14491] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 362.400615][T14491] ? _copy_from_user+0x15b/0x260 [ 362.405545][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.410644][T14491] __msan_chain_origin+0x50/0x90 [ 362.415585][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.420694][T14491] get_compat_msghdr+0x108/0x270 [ 362.425626][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.430293][T14491] ? kmsan_get_metadata+0x11d/0x180 [ 362.435487][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.440586][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.445684][T14491] ? kmsan_internal_check_memory+0xb1/0x3d0 [ 362.451576][T14491] ? kmsan_check_memory+0xd/0x10 [ 362.456509][T14491] ? kmsan_get_metadata+0x11d/0x180 [ 362.461695][T14491] ? kmsan_get_metadata+0x11d/0x180 [ 362.466882][T14491] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 362.472676][T14491] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 362.478813][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.483910][T14491] ? kmsan_get_metadata+0x4f/0x180 [ 362.489010][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.494369][T14491] ? __x32_compat_sys_sendmsg+0x70/0x70 [ 362.499900][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.505449][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.510645][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.515484][T14491] do_SYSENTER_32+0x73/0x90 [ 362.519986][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.526296][T14491] RIP: 0023:0xf7fbf549 [ 362.530341][T14491] Code: Bad RIP value. [ 362.534393][T14491] RSP: 002b:00000000f5d990cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 362.542788][T14491] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020001380 [ 362.550743][T14491] RDX: 00000000fffffeed RSI: 0000000000000000 RDI: 0000000000000000 [ 362.558701][T14491] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 362.566658][T14491] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 362.574616][T14491] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 362.582583][T14491] Uninit was stored to memory at: [ 362.587598][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.593299][T14491] __msan_chain_origin+0x50/0x90 [ 362.598222][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.603321][T14491] get_compat_msghdr+0x108/0x270 [ 362.608243][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.612905][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.618262][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.623791][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.628973][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.633806][T14491] do_SYSENTER_32+0x73/0x90 [ 362.638291][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.644593][T14491] [ 362.646903][T14491] Uninit was stored to memory at: [ 362.651915][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.657617][T14491] __msan_chain_origin+0x50/0x90 [ 362.662542][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.667638][T14491] get_compat_msghdr+0x108/0x270 [ 362.672560][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.677220][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.682574][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.688102][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.693286][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.698129][T14491] do_SYSENTER_32+0x73/0x90 [ 362.702620][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.708921][T14491] [ 362.711228][T14491] Uninit was stored to memory at: [ 362.716237][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.721939][T14491] __msan_chain_origin+0x50/0x90 [ 362.726869][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.731966][T14491] get_compat_msghdr+0x108/0x270 [ 362.736886][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.741549][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.746912][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.752440][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.757620][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.762457][T14491] do_SYSENTER_32+0x73/0x90 [ 362.766945][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.773250][T14491] [ 362.775560][T14491] Uninit was stored to memory at: [ 362.780570][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.786272][T14491] __msan_chain_origin+0x50/0x90 [ 362.791193][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.796292][T14491] get_compat_msghdr+0x108/0x270 [ 362.801211][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.805870][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.811221][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.816787][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.821971][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.826805][T14491] do_SYSENTER_32+0x73/0x90 [ 362.831293][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.837605][T14491] [ 362.839929][T14491] Uninit was stored to memory at: [ 362.844945][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.850654][T14491] __msan_chain_origin+0x50/0x90 [ 362.855583][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.860677][T14491] get_compat_msghdr+0x108/0x270 [ 362.865603][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.870263][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.875620][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.881149][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.886333][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.891170][T14491] do_SYSENTER_32+0x73/0x90 [ 362.895660][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.901966][T14491] [ 362.904276][T14491] Uninit was stored to memory at: [ 362.909287][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.914991][T14491] __msan_chain_origin+0x50/0x90 [ 362.919914][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.925009][T14491] get_compat_msghdr+0x108/0x270 [ 362.929930][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.934589][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 362.939944][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 362.945473][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 362.950655][T14491] do_fast_syscall_32+0x6b/0xd0 [ 362.955490][T14491] do_SYSENTER_32+0x73/0x90 [ 362.959975][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 362.966277][T14491] [ 362.968586][T14491] Uninit was stored to memory at: [ 362.973595][T14491] kmsan_internal_chain_origin+0xad/0x130 [ 362.979297][T14491] __msan_chain_origin+0x50/0x90 [ 362.984220][T14491] __get_compat_msghdr+0x5be/0x890 [ 362.989314][T14491] get_compat_msghdr+0x108/0x270 [ 362.994241][T14491] __sys_sendmmsg+0x7d5/0xd80 [ 362.998900][T14491] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 363.004257][T14491] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 363.009784][T14491] __do_fast_syscall_32+0x2aa/0x400 [ 363.014968][T14491] do_fast_syscall_32+0x6b/0xd0 [ 363.019800][T14491] do_SYSENTER_32+0x73/0x90 [ 363.024315][T14491] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 363.030616][T14491] [ 363.032926][T14491] Local variable ----msg_sys@__sys_sendmmsg created at: [ 363.039842][T14491] __sys_sendmmsg+0xb7/0xd80 [ 363.044417][T14491] __sys_sendmmsg+0xb7/0xd80 09:14:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:42 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x20008) [ 363.752040][ T229] tipc: TX() has been purged, node left! [ 363.882407][ T229] tipc: TX() has been purged, node left! 09:14:42 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:42 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) [ 364.041902][ T229] tipc: TX() has been purged, node left! 09:14:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) 09:14:44 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:44 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:44 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) 09:14:44 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 09:14:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) mremap(&(0x7f0000cfa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c56000/0x2000)=nil) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x20008) 09:14:46 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 09:14:46 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/nvram\x00', 0x408800, 0x0) setsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f0000000a40)="67bb9ce794468489678b7c4440693358b7fd5f62b09824da0624d725e07811e85eadfa64e9488392ca925f51d923c3edd1644e27809ef1652ffad7338d40d4cbef384df5a089426bf39114659b158c42c9e1636e20cf08f0", 0x58) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x7}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x140) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:14:46 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom$llc(r0, &(0x7f0000000080)=""/25, 0x19, 0x40002102, 0x0, 0x0) 09:14:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) r4 = fcntl$dupfd(r3, 0x0, r3) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)) r5 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x20008) 09:14:46 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:46 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x8000000002, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="4c0000001200ff", 0x7}], 0x1}, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x20300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, 0x0, 0x0) r5 = memfd_create(&(0x7f0000000100)='\xb8.\xa5\xd7o\xe02\xe3\aC\xdb\xf6O\x16\xa3\xdd\xb0\x92hia\xf2\xc3\xa3\xd9\xee\xd9s\x92\f]#\x1a:\xdc\xdf\x8c\xdd\xcd\x13\x9d\x98\xf8I\x15\x87\xde\x9c\xa7\xf3\xa4%r\x93\xac\xa9\x03R\x8f9\xa7\xd1\x00bn\x1f\xf5\x00\x84\xd9\x1a\xf0\xc4\x9e\xc1\xbe=\xac\x88\xfb\x92\x10\x85\xe6\xb0\x8d\x997T)X?\x16\xc1\x02\x17A\xa5\xee\xb9\xea\x91\xc9\xff$\x06Yu\xeb\xda\xb5\rrN\x00'/128, 0x0) dup2(r3, r5) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r5, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="020080000100576eff8c761cddd53530a5afa79827d6d7cf72daab70ff08689f5366df876ca1dfd20903000000b5700000000000025b1b59ce460ba7cfa746e3dfc49afd2ef7cdb49e0ea2d661c4f015bf6471fc7bc4572f9ea30095", @ANYRES32, @ANYBLOB="000000f0ff0000006e0800ff", @ANYRESOCT, @ANYRESHEX, @ANYRESDEC, @ANYRESHEX], 0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 09:14:47 executing program 0: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760) 09:14:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = inotify_init1(0x80000) fcntl$dupfd(r3, 0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0x20008) 09:14:47 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 368.464592][T14593] IPVS: ftp: loaded support on port[0] = 21 [ 368.920612][T14602] IPVS: ftp: loaded support on port[0] = 21 09:14:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f00001f2000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000040)="0fc7b9ae50660f3a0de562f20f320f01df6766c7442400731b00006766c7442402000001006766c744240600000000670f011c24b803008ee00f2266eaf653c70066b9800000c00f326635010000000f300f01c8", 0x54}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:14:47 executing program 0: sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x30, 0x0, 0x400, 0x0, 0x0, {}, [@NL80211_ATTR_KEY={0x14, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5}, @NL80211_KEY_CIPHER={0x8}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x30}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, 0x0, 0x7, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_QUOTA={0xc}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}]}]}, 0x34}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) 09:14:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) inotify_init1(0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r3, 0x20008) 09:14:48 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)=ANY=[@ANYBLOB="000000002a250000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800000000000001000080"]) 09:14:48 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:48 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x7fff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000400)="d58b930b6061de9cdc9d8d3151cf1e52eef04f9f37ead8d70dd5fc886e214bc5fa", 0x21}, {0x0}], 0x2, 0xf) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c74, 0x4, @perf_config_ext={0x0, 0x35e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000540)={0x400, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}}}, 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:14:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) r2 = gettid() tkill(r2, 0x3c) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r3, 0x20008) 09:14:48 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:48 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 370.082341][ T229] tipc: TX() has been purged, node left! [ 370.203048][T14700] IPVS: ftp: loaded support on port[0] = 21 09:14:49 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 370.578737][T14714] IPVS: ftp: loaded support on port[0] = 21 09:14:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:49 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:49 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r1, &(0x7f0000001240)={@void, @void, @eth={@broadcast, @link_local, @val={@void}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, 0x0, 0x0, @multicast2, "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"}}}}}}, 0x1012) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x5fffffffd, 0x0) 09:14:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x7fff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000400)="d58b930b6061de9cdc9d8d3151cf1e52eef04f9f37ead8d70dd5fc886e214bc5fa", 0x21}, {0x0}], 0x2, 0xf) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c74, 0x4, @perf_config_ext={0x0, 0x35e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000540)={0x400, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}}}, 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:14:50 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:50 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) [ 371.658930][T14787] IPVS: ftp: loaded support on port[0] = 21 09:14:50 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:50 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) [ 372.187732][T14798] IPVS: ftp: loaded support on port[0] = 21 09:14:51 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:51 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:51 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 372.864684][T14839] fuse: Bad value for 'fd' 09:14:52 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) [ 374.723056][ T229] tipc: TX() has been purged, node left! 09:14:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x7fff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000400)="d58b930b6061de9cdc9d8d3151cf1e52eef04f9f37ead8d70dd5fc886e214bc5fa", 0x21}, {0x0}], 0x2, 0xf) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c74, 0x4, @perf_config_ext={0x0, 0x35e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000540)={0x400, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}}}, 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:14:54 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:54 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:54 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:54 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:54 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) [ 376.219135][T14888] fuse: Bad value for 'fd' [ 376.368654][T14884] IPVS: ftp: loaded support on port[0] = 21 09:14:55 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:55 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 376.674831][T14914] IPVS: ftp: loaded support on port[0] = 21 09:14:55 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) [ 377.088824][T14946] fuse: Bad value for 'fd' [ 377.552007][ T229] tipc: TX() has been purged, node left! 09:14:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x7fff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000400)="d58b930b6061de9cdc9d8d3151cf1e52eef04f9f37ead8d70dd5fc886e214bc5fa", 0x21}, {0x0}], 0x2, 0xf) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c74, 0x4, @perf_config_ext={0x0, 0x35e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000540)={0x400, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}}}, 0x88) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:14:56 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:56 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:56 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:56 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:56 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) [ 377.925760][T14980] IPVS: ftp: loaded support on port[0] = 21 09:14:56 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:57 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 378.236753][T15013] IPVS: ftp: loaded support on port[0] = 21 [ 378.419473][T15024] fuse: Bad value for 'fd' 09:14:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e9976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) dup2(r5, r4) 09:14:57 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:57 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:57 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) [ 379.144511][T15068] fuse: Bad value for 'fd' 09:14:58 executing program 2: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:58 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 379.458003][T15079] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 09:14:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:58 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:58 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:58 executing program 2: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 379.802066][T15096] fuse: Bad value for 'fd' 09:14:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) dup2(r5, r4) 09:14:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:14:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:59 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:59 executing program 2: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:59 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:14:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) [ 380.298621][T15111] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 09:14:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:59 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:14:59 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:14:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x20008) 09:14:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e9976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) dup2(r5, r4) 09:14:59 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 381.070937][T15140] fuse: Bad value for 'fd' 09:15:00 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:00 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 381.298625][T15146] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 09:15:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:15:00 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:00 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 381.662593][T15163] fuse: Bad value for 'fd' 09:15:00 executing program 5: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) dup2(r5, r4) 09:15:00 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:15:01 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:01 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:01 executing program 5: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) [ 382.270405][T15183] fuse: Bad value for 'fd' [ 382.278815][T15181] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 382.301906][ T229] tipc: TX() has been purged, node left! 09:15:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000dc) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:15:01 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:01 executing program 5: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:01 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:01 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e9976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x20008) 09:15:01 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:02 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:02 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:02 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) tkill(0x0, 0x3c) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:02 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 383.607480][T15233] fuse: Bad value for 'fd' 09:15:02 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) [ 383.835642][T15241] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 09:15:02 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:02 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:02 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x3c) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:03 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) [ 384.182482][T15256] fuse: Bad value for 'fd' 09:15:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:03 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:03 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:03 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:03 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) [ 384.745265][T15270] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 384.809825][T15276] fuse: Bad value for 'fd' 09:15:03 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:04 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:04 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:15:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:04 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 385.587263][T15300] kvm: vcpu 129: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 09:15:04 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:04 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:04 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 09:15:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:05 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:05 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x20008) 09:15:05 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 09:15:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:05 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:06 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:06 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 09:15:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) 09:15:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:06 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:06 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:06 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22c002, 0x0) 09:15:06 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:15:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) 09:15:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:06 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, 0x0) 09:15:07 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x22c002, 0x0) 09:15:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x20008) 09:15:07 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:07 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, 0x0) 09:15:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x22c002, 0x0) 09:15:07 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) 09:15:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/psched\x00') mmap$binder(&(0x7f0000c58000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 09:15:07 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:07 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, 0x0) 09:15:08 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) 09:15:08 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x22c002, 0x0) 09:15:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup(0xffffffffffffffff) 09:15:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:08 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 09:15:08 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:08 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) 09:15:08 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 389.924863][T15473] fuse: Bad value for 'fd' 09:15:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:08 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 09:15:08 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 09:15:09 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:09 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:09 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 09:15:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5605, 0x2) 09:15:09 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 09:15:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) [ 390.565581][T15491] fuse: Bad value for 'fd' [ 390.578557][T15492] fuse: Bad value for 'fd' 09:15:09 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:09 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:09 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 09:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:09 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 09:15:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) [ 391.098346][T15505] fuse: Bad value for 'fd' [ 391.120871][T15506] fuse: Bad value for 'fd' 09:15:10 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:10 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 391.344846][T15512] FAT-fs (loop1): bogus number of reserved sectors [ 391.351955][T15512] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 391.529725][T15512] FAT-fs (loop1): bogus number of reserved sectors [ 391.536421][T15512] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:10 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 391.776093][T15525] fuse: Bad value for 'fd' 09:15:10 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:10 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:10 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:11 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cff3fb", 0x11) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 392.242183][T15541] fuse: Invalid rootmode [ 392.259401][T15542] FAT-fs (loop1): bogus number of reserved sectors [ 392.266184][T15542] FAT-fs (loop1): Can't find a valid FAT filesystem [ 392.281985][T15544] fuse: Invalid rootmode 09:15:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:11 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:11 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:11 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 392.838842][T15563] fuse: Invalid rootmode [ 392.840094][T15564] FAT-fs (loop1): bogus number of reserved sectors [ 392.850141][T15564] FAT-fs (loop1): Can't find a valid FAT filesystem [ 392.927895][T15566] fuse: Invalid rootmode 09:15:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:11 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:12 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 09:15:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 393.478149][T15582] FAT-fs (loop1): bogus number of reserved sectors [ 393.485019][T15582] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 393.583069][T15592] fuse: Invalid rootmode [ 393.639925][T15593] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 [ 393.676079][T15596] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x3002200, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x1, 'ip6tnl0\x00'}) 09:15:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:12 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 394.100257][T15611] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 394.358313][T15621] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto(r0, &(0x7f00000000c0)="dd", 0x1, 0x189, 0x0, 0x0) 09:15:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:13 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 394.800705][T15636] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="e3d0e9d6d9d18e5f39868de363d3", 0x0, 0x19d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={@cgroup, 0xffffffffffffffff, 0x84f7f5c7b4d013aa}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='.eth1/+,em0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, 0x40) 09:15:14 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) [ 395.376104][T15663] [ 395.378580][T15663] ********************************************************** [ 395.386262][T15663] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 395.393824][T15663] ** ** [ 395.401351][T15663] ** trace_printk() being used. Allocating extra memory. ** [ 395.408829][T15663] ** ** [ 395.416361][T15663] ** This means that this is a DEBUG kernel and it is ** [ 395.423862][T15663] ** unsafe for production use. ** [ 395.431448][T15663] ** ** [ 395.438863][T15663] ** If you see this message and you are not debugging ** [ 395.446388][T15663] ** the kernel, report this immediately to your vendor! ** [ 395.453906][T15663] ** ** [ 395.461430][T15663] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 395.468841][T15663] ********************************************************** 09:15:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 395.758669][T15677] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:14 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:14 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) [ 396.149905][T15668] [ 396.153049][T15668] ********************************************************** [ 396.160481][T15668] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 396.168063][T15668] ** ** [ 396.175594][T15668] ** trace_printk() being used. Allocating extra memory. ** [ 396.183153][T15668] ** ** [ 396.190568][T15668] ** This means that this is a DEBUG kernel and it is ** [ 396.198124][T15668] ** unsafe for production use. ** [ 396.205658][T15668] ** ** [ 396.213241][T15668] ** If you see this message and you are not debugging ** [ 396.220659][T15668] ** the kernel, report this immediately to your vendor! ** [ 396.228229][T15668] ** ** [ 396.235722][T15668] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 396.243218][T15668] ********************************************************** 09:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:15 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:15 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:15 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 396.692615][T15707] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 396.838910][T15709] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:16 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:16 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 397.314724][T15731] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:15:16 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:16 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:17 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756", 0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:15:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:17 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756", 0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:17 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}]}) 09:15:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:18 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 399.156601][T15814] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) [ 399.388163][T15831] FAT-fs (loop1): bogus number of reserved sectors [ 399.395463][T15831] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:18 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756", 0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:18 executing program 2: mknod$loop(0x0, 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 399.569588][T15836] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:18 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:18 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}]}) 09:15:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 400.065373][T15861] FAT-fs (loop1): bogus number of reserved sectors [ 400.072321][T15861] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:19 executing program 2: mknod$loop(0x0, 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}]}) 09:15:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:19 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:19 executing program 2: mknod$loop(0x0, 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 400.673313][T15886] FAT-fs (loop1): bogus number of reserved sectors [ 400.679938][T15886] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:19 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:19 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:19 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 401.298705][T15920] FAT-fs (loop1): bogus number of reserved sectors [ 401.305693][T15920] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:20 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5cf", 0xf) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 401.459625][T15932] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:20 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 09:15:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, 0x0) 09:15:20 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:20 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 401.827047][T15941] FAT-fs (loop1): bogus number of reserved sectors [ 401.833848][T15941] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@iocharset={'iocharset', 0x3d, 'default'}}]}) 09:15:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, 0x0) [ 402.257452][T15968] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:21 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:21 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) [ 402.625399][T15972] FAT-fs (loop1): bogus number of reserved sectors [ 402.632240][T15972] FAT-fs (loop1): Can't find a valid FAT filesystem 09:15:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, 0x0) [ 403.179055][T15995] isofs_fill_super: bread failed, dev=md0, iso_blknum=16, block=32 09:15:22 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r4, 0x7fff) 09:15:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="e3d0e9d6d9d18e5f39868de363d3", 0x0, 0x19d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 09:15:22 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:22 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:22 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:22 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:23 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) 09:15:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:23 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:23 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="e3d0e9d6d9d18e5f39868de363d3", 0x0, 0x19d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 09:15:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0xc0000100, 0x0, 0x3, 0x8, 0x17b]}) 09:15:24 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:24 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) prctl$PR_GET_KEEPCAPS(0x7) 09:15:24 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:24 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:24 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4", 0xd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:24 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:24 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xac) 09:15:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:24 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000480)="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", 0x515}], 0x1}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 09:15:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x50, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x5, 0x43400) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) 09:15:25 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:25 executing program 4: 09:15:25 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:25 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 09:15:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:25 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:25 executing program 4: 09:15:25 executing program 1: 09:15:25 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:25 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:26 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:26 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0x3ff, 0x4) 09:15:26 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:26 executing program 4: 09:15:26 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000040002) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) 09:15:26 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:26 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:26 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:26 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x4000000205}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) io_destroy(r1) 09:15:26 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, 0x0, 0x0) 09:15:26 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:27 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 09:15:27 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 09:15:27 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/m'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:27 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000380)={0x0, 0x0, 0x9d2c, 0x4000000205}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) io_destroy(r1) 09:15:27 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) 09:15:27 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/m'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 09:15:27 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 09:15:27 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/m'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) write$evdev(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:28 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:28 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 09:15:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 09:15:28 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 09:15:28 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:29 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) write$evdev(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:29 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 09:15:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) write$evdev(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:29 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) 09:15:29 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:29 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:29 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) listen(r1, 0x0) 09:15:30 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:30 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(0xffffffffffffffff, &(0x7f0000002000), 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000040002) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0), 0xfec) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) 09:15:30 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) 09:15:30 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:30 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], 0x0, &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 09:15:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) 09:15:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) io_submit(0x0, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/98, 0x62) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) 09:15:30 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 09:15:31 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) 09:15:31 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 412.179239][ T32] audit: type=1400 audit(1595409331.033:32): avc: denied { execmem } for pid=16286 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 09:15:31 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 09:15:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0xfffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) ioctl$TCSETSW(r2, 0x5403, 0x0) write$evdev(r2, &(0x7f0000000100)=[{{0x77359400}, 0x5}, {{}, 0x4, 0x0, 0x5}, {{0x77359400}, 0x16, 0x0, 0x3}], 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 09:15:31 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:31 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) 09:15:31 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/md0'], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 09:15:31 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) 09:15:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(r1, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @local}, 0x1c) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000001340)=@file={0x0, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}, 0x6e) 09:15:32 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:15:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 09:15:34 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x16b342, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10001008) 09:15:34 executing program 0: timerfd_create(0x4, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x401000, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x2f) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(r0, 0x0, 0x4) dup(r1) open$dir(0x0, 0x484cc2, 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe26) open$dir(0x0, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) 09:15:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000000c0)=0xbf) 09:15:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x380000e, 0x11, r0, 0x0) 09:15:34 executing program 3: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)="c912046853db6b1756d6277cb4e5", 0xe) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 415.919013][T16353] ===================================================== [ 415.926015][T16353] BUG: KMSAN: uninit-value in kmsan_handle_dma+0x9f/0xb0 [ 415.933056][T16353] CPU: 1 PID: 16353 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 415.941726][T16353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.951785][T16353] Call Trace: [ 415.955089][T16353] dump_stack+0x1df/0x240 [ 415.959435][T16353] kmsan_report+0xf7/0x1e0 [ 415.963863][T16353] kmsan_internal_check_memory+0x19d/0x3d0 [ 415.969695][T16353] kmsan_handle_dma+0x9f/0xb0 [ 415.974384][T16353] virtqueue_add+0x46db/0x70f0 [ 415.979161][T16353] ? kmsan_task_context_state+0x47/0x90 [ 415.984709][T16353] ? kmsan_task_context_state+0x47/0x90 [ 415.990274][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 415.996112][T16353] virtqueue_add_sgs+0x319/0x330 [ 416.001071][T16353] virtscsi_add_cmd+0x888/0xb20 [ 416.005962][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.011818][T16353] virtscsi_queuecommand+0xe72/0x1080 [ 416.017204][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.023014][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.028221][T16353] ? virtscsi_init+0x1220/0x1220 [ 416.033160][T16353] scsi_queue_rq+0x3eb7/0x4b00 [ 416.037946][T16353] ? scsi_vpd_tpg_id+0x3e0/0x3e0 [ 416.042892][T16353] blk_mq_dispatch_rq_list+0x931/0x3430 [ 416.048445][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.054258][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.059463][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.065282][T16353] ? __msan_metadata_ptr_for_load_4+0x20/0x20 [ 416.071363][T16353] blk_mq_do_dispatch_sched+0x609/0x880 [ 416.076932][T16353] __blk_mq_sched_dispatch_requests+0x60e/0x8f0 [ 416.083178][T16353] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 416.089333][T16353] ? rb_insert_color+0xbbe/0x1180 [ 416.094363][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.099572][T16353] blk_mq_sched_dispatch_requests+0x15d/0x2d0 [ 416.105653][T16353] __blk_mq_run_hw_queue+0x171/0x3a0 [ 416.110944][T16353] __blk_mq_delay_run_hw_queue+0x15d/0x6a0 [ 416.116761][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.121967][T16353] blk_mq_run_hw_queue+0x4ac/0x670 [ 416.127105][T16353] blk_mq_sched_insert_requests+0x496/0x640 [ 416.133015][T16353] blk_mq_flush_plug_list+0xb21/0xca0 [ 416.138408][T16353] blk_flush_plug_list+0x72f/0x7b0 [ 416.143527][T16353] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 416.149606][T16353] blk_finish_plug+0xa0/0xd0 [ 416.154207][T16353] ext4_writepages+0x59d0/0x64c0 [ 416.159198][T16353] ? kmsan_get_shadow_origin_ptr+0x82/0xb0 [ 416.165023][T16353] ? ctx_sched_in+0x8a8/0x8c0 [ 416.169693][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.174903][T16353] ? ext4_readpage+0x3e0/0x3e0 [ 416.179674][T16353] do_writepages+0x143/0x400 [ 416.184273][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.189485][T16353] __filemap_fdatawrite_range+0x53b/0x5b0 [ 416.196706][T16353] file_write_and_wait_range+0x1b8/0x3d0 [ 416.202353][T16353] ext4_sync_file+0x464/0x1220 [ 416.207131][T16353] ? ext4_getfsmap_compare+0x100/0x100 [ 416.212596][T16353] vfs_fsync_range+0x2af/0x310 [ 416.217374][T16353] ext4_buffered_write_iter+0x9fb/0xac0 [ 416.222930][T16353] ext4_file_write_iter+0x1034/0x2dd0 [ 416.228304][T16353] ? sched_clock_cpu+0x7c/0x930 [ 416.233155][T16353] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 416.239224][T16353] ? sched_clock_cpu+0x7c/0x930 [ 416.244079][T16353] ? kmsan_internal_poison_shadow+0x66/0xd0 [ 416.249977][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.255185][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.260999][T16353] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 416.267071][T16353] ? kmsan_get_metadata+0x4f/0x180 [ 416.272199][T16353] ? ext4_file_read_iter+0xa90/0xa90 [ 416.277589][T16353] do_iter_readv_writev+0x94a/0xb10 [ 416.282809][T16353] do_iter_write+0x303/0xdc0 [ 416.287412][T16353] ? kmalloc_array+0xa1/0x130 [ 416.292096][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.297306][T16353] ? ext4_file_read_iter+0xa90/0xa90 [ 416.302601][T16353] vfs_iter_write+0x118/0x180 [ 416.307293][T16353] iter_file_splice_write+0xb5f/0x1800 [ 416.312808][T16353] ? splice_from_pipe+0x2f0/0x2f0 [ 416.317844][T16353] direct_splice_actor+0x1fd/0x580 [ 416.322968][T16353] ? kmsan_get_metadata+0x4f/0x180 [ 416.328092][T16353] splice_direct_to_actor+0x6b2/0xf50 [ 416.333467][T16353] ? do_splice_direct+0x580/0x580 [ 416.338522][T16353] do_splice_direct+0x342/0x580 [ 416.343400][T16353] do_sendfile+0x101b/0x1d40 [ 416.348018][T16353] __se_compat_sys_sendfile+0x301/0x3c0 [ 416.353578][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.358778][T16353] ? __ia32_sys_sendfile64+0x70/0x70 [ 416.364067][T16353] __ia32_compat_sys_sendfile+0x56/0x70 [ 416.369618][T16353] __do_fast_syscall_32+0x2aa/0x400 [ 416.374833][T16353] do_fast_syscall_32+0x6b/0xd0 [ 416.379708][T16353] do_SYSENTER_32+0x73/0x90 [ 416.384300][T16353] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 416.390625][T16353] RIP: 0023:0xf7f9c549 [ 416.394692][T16353] Code: Bad RIP value. [ 416.398754][T16353] RSP: 002b:00000000f5d970cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 416.407170][T16353] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000005 [ 416.415154][T16353] RDX: 0000000000000000 RSI: 0000000010001008 RDI: 0000000000000000 [ 416.423117][T16353] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 416.431093][T16353] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 416.439065][T16353] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 416.447044][T16353] [ 416.449366][T16353] Uninit was stored to memory at: [ 416.454394][T16353] kmsan_internal_chain_origin+0xad/0x130 [ 416.460115][T16353] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 416.466104][T16353] kmsan_memcpy_metadata+0xb/0x10 [ 416.471128][T16353] __msan_memcpy+0x43/0x50 [ 416.475552][T16353] iov_iter_copy_from_user_atomic+0x11b1/0x1780 [ 416.481793][T16353] generic_perform_write+0x499/0x9a0 [ 416.487082][T16353] ext4_buffered_write_iter+0x795/0xac0 [ 416.492627][T16353] ext4_file_write_iter+0x1034/0x2dd0 [ 416.498006][T16353] do_iter_readv_writev+0x94a/0xb10 [ 416.503205][T16353] do_iter_write+0x303/0xdc0 [ 416.507799][T16353] vfs_iter_write+0x118/0x180 [ 416.512481][T16353] iter_file_splice_write+0xb5f/0x1800 [ 416.517944][T16353] direct_splice_actor+0x1fd/0x580 [ 416.523061][T16353] splice_direct_to_actor+0x6b2/0xf50 [ 416.528438][T16353] do_splice_direct+0x342/0x580 [ 416.533288][T16353] do_sendfile+0x101b/0x1d40 [ 416.537890][T16353] __se_compat_sys_sendfile+0x301/0x3c0 [ 416.543438][T16353] __ia32_compat_sys_sendfile+0x56/0x70 [ 416.548990][T16353] __do_fast_syscall_32+0x2aa/0x400 [ 416.554196][T16353] do_fast_syscall_32+0x6b/0xd0 [ 416.559052][T16353] do_SYSENTER_32+0x73/0x90 [ 416.563558][T16353] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 416.569873][T16353] [ 416.572195][T16353] Uninit was created at: [ 416.576440][T16353] kmsan_save_stack_with_flags+0x3c/0x90 [ 416.582075][T16353] kmsan_alloc_page+0xb9/0x180 [ 416.586841][T16353] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 416.592387][T16353] alloc_pages_current+0x672/0x990 [ 416.597502][T16353] push_pipe+0x605/0xb70 [ 416.601746][T16353] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 416.607473][T16353] do_splice_to+0x4fc/0x14f0 [ 416.612066][T16353] splice_direct_to_actor+0x45c/0xf50 [ 416.617440][T16353] do_splice_direct+0x342/0x580 [ 416.622296][T16353] do_sendfile+0x101b/0x1d40 [ 416.626887][T16353] __se_compat_sys_sendfile+0x301/0x3c0 [ 416.632433][T16353] __ia32_compat_sys_sendfile+0x56/0x70 [ 416.637978][T16353] __do_fast_syscall_32+0x2aa/0x400 [ 416.643164][T16353] do_fast_syscall_32+0x6b/0xd0 [ 416.648002][T16353] do_SYSENTER_32+0x73/0x90 [ 416.652490][T16353] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 416.658792][T16353] [ 416.661105][T16353] Bytes 0-167 of 4096 are uninitialized [ 416.666635][T16353] Memory access of size 4096 starts at ffff8c0d3ba45000 [ 416.673636][T16353] ===================================================== [ 416.680563][T16353] Disabling lock debugging due to kernel taint [ 416.686693][T16353] Kernel panic - not syncing: panic_on_warn set ... [ 416.693265][T16353] CPU: 1 PID: 16353 Comm: syz-executor.5 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 416.703301][T16353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.713338][T16353] Call Trace: [ 416.716635][T16353] dump_stack+0x1df/0x240 [ 416.720957][T16353] panic+0x3d5/0xc3e [ 416.724860][T16353] kmsan_report+0x1df/0x1e0 [ 416.729352][T16353] kmsan_internal_check_memory+0x19d/0x3d0 [ 416.735152][T16353] kmsan_handle_dma+0x9f/0xb0 [ 416.739818][T16353] virtqueue_add+0x46db/0x70f0 [ 416.744578][T16353] ? kmsan_task_context_state+0x47/0x90 [ 416.750108][T16353] ? kmsan_task_context_state+0x47/0x90 [ 416.755647][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.761461][T16353] virtqueue_add_sgs+0x319/0x330 [ 416.766397][T16353] virtscsi_add_cmd+0x888/0xb20 [ 416.771251][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.777045][T16353] virtscsi_queuecommand+0xe72/0x1080 [ 416.782405][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.788195][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.793383][T16353] ? virtscsi_init+0x1220/0x1220 [ 416.798304][T16353] scsi_queue_rq+0x3eb7/0x4b00 [ 416.803068][T16353] ? scsi_vpd_tpg_id+0x3e0/0x3e0 [ 416.807990][T16353] blk_mq_dispatch_rq_list+0x931/0x3430 [ 416.813522][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.819313][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.824495][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 416.830290][T16353] ? __msan_metadata_ptr_for_load_4+0x20/0x20 [ 416.836362][T16353] blk_mq_do_dispatch_sched+0x609/0x880 [ 416.841907][T16353] __blk_mq_sched_dispatch_requests+0x60e/0x8f0 [ 416.848136][T16353] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 416.854278][T16353] ? rb_insert_color+0xbbe/0x1180 [ 416.859296][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.864490][T16353] blk_mq_sched_dispatch_requests+0x15d/0x2d0 [ 416.870555][T16353] __blk_mq_run_hw_queue+0x171/0x3a0 [ 416.875830][T16353] __blk_mq_delay_run_hw_queue+0x15d/0x6a0 [ 416.881622][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.886814][T16353] blk_mq_run_hw_queue+0x4ac/0x670 [ 416.891917][T16353] blk_mq_sched_insert_requests+0x496/0x640 [ 416.897802][T16353] blk_mq_flush_plug_list+0xb21/0xca0 [ 416.903171][T16353] blk_flush_plug_list+0x72f/0x7b0 [ 416.908268][T16353] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 416.914326][T16353] blk_finish_plug+0xa0/0xd0 [ 416.918906][T16353] ext4_writepages+0x59d0/0x64c0 [ 416.923864][T16353] ? kmsan_get_shadow_origin_ptr+0x82/0xb0 [ 416.929658][T16353] ? ctx_sched_in+0x8a8/0x8c0 [ 416.934323][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.939508][T16353] ? ext4_readpage+0x3e0/0x3e0 [ 416.944257][T16353] do_writepages+0x143/0x400 [ 416.948835][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 416.954024][T16353] __filemap_fdatawrite_range+0x53b/0x5b0 [ 416.959738][T16353] file_write_and_wait_range+0x1b8/0x3d0 [ 416.965364][T16353] ext4_sync_file+0x464/0x1220 [ 416.970119][T16353] ? ext4_getfsmap_compare+0x100/0x100 [ 416.975563][T16353] vfs_fsync_range+0x2af/0x310 [ 416.980318][T16353] ext4_buffered_write_iter+0x9fb/0xac0 [ 416.985852][T16353] ext4_file_write_iter+0x1034/0x2dd0 [ 416.991206][T16353] ? sched_clock_cpu+0x7c/0x930 [ 416.996043][T16353] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 417.002094][T16353] ? sched_clock_cpu+0x7c/0x930 [ 417.006928][T16353] ? kmsan_internal_poison_shadow+0x66/0xd0 [ 417.012804][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 417.017988][T16353] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 417.023777][T16353] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 417.029829][T16353] ? kmsan_get_metadata+0x4f/0x180 [ 417.034937][T16353] ? ext4_file_read_iter+0xa90/0xa90 [ 417.040205][T16353] do_iter_readv_writev+0x94a/0xb10 [ 417.045401][T16353] do_iter_write+0x303/0xdc0 [ 417.049979][T16353] ? kmalloc_array+0xa1/0x130 [ 417.054648][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 417.059853][T16353] ? ext4_file_read_iter+0xa90/0xa90 [ 417.065122][T16353] vfs_iter_write+0x118/0x180 [ 417.069791][T16353] iter_file_splice_write+0xb5f/0x1800 [ 417.075256][T16353] ? splice_from_pipe+0x2f0/0x2f0 [ 417.080266][T16353] direct_splice_actor+0x1fd/0x580 [ 417.085367][T16353] ? kmsan_get_metadata+0x4f/0x180 [ 417.090466][T16353] splice_direct_to_actor+0x6b2/0xf50 [ 417.095922][T16353] ? do_splice_direct+0x580/0x580 [ 417.100946][T16353] do_splice_direct+0x342/0x580 [ 417.105791][T16353] do_sendfile+0x101b/0x1d40 [ 417.110387][T16353] __se_compat_sys_sendfile+0x301/0x3c0 [ 417.115923][T16353] ? kmsan_get_metadata+0x11d/0x180 [ 417.121104][T16353] ? __ia32_sys_sendfile64+0x70/0x70 [ 417.126472][T16353] __ia32_compat_sys_sendfile+0x56/0x70 [ 417.132004][T16353] __do_fast_syscall_32+0x2aa/0x400 [ 417.137195][T16353] do_fast_syscall_32+0x6b/0xd0 [ 417.142057][T16353] do_SYSENTER_32+0x73/0x90 [ 417.146553][T16353] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 417.152871][T16353] RIP: 0023:0xf7f9c549 [ 417.156921][T16353] Code: Bad RIP value. [ 417.160990][T16353] RSP: 002b:00000000f5d970cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 417.169388][T16353] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000005 [ 417.177345][T16353] RDX: 0000000000000000 RSI: 0000000010001008 RDI: 0000000000000000 [ 417.185299][T16353] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 417.193356][T16353] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 417.201311][T16353] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 417.210593][T16353] Kernel Offset: 0xfe00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 417.222233][T16353] Rebooting in 86400 seconds..