b995adfe5d3b2a5b1761102065e3aaacd41b880414f45c436b79ae2c2ece992661c026f1550e2f0e124d57c04299402c9d22a43") ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000280)={{0x3, 0x400, 0x101, 0x1}, 'syz1\x00', 0x2c}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000140)={r4, 0x3}) 16:59:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 16:59:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xdf}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000180)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000200)={{0x100000000, 0x7}, 0x0, 0x9, 0x9, {0x1, 0x1}, 0xf166, 0x800}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) 16:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000180}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x400, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffff, 0xa42, 0x3, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000100)) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000000c0)={r3, 0xf22, 0x80000001, r3}) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x20000102000007) r3 = syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f00000000c0), 0x4) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000200)="07dfd3f6ad26cadf6d69e7a42f92fb62e1a758a0da4059db4a917fcafc6b11f5ce40c99675c614804d06e49223d508fde23d9da0c07b995adfe5d3b2a5b1761102065e3aaacd41b880414f45c436b79ae2c2ece992661c026f1550e2f0e124d57c04299402c9d22a43") ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000280)={{0x3, 0x400, 0x101, 0x1}, 'syz1\x00', 0x2c}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000140)={r4, 0x3}) 16:59:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 16:59:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x20000102000007) r3 = syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f00000000c0), 0x4) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000200)="07dfd3f6ad26cadf6d69e7a42f92fb62e1a758a0da4059db4a917fcafc6b11f5ce40c99675c614804d06e49223d508fde23d9da0c07b995adfe5d3b2a5b1761102065e3aaacd41b880414f45c436b79ae2c2ece992661c026f1550e2f0e124d57c04299402c9d22a43") ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000280)={{0x3, 0x400, 0x101, 0x1}, 'syz1\x00', 0x2c}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000140)={r4, 0x3}) 16:59:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xdf}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000180)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000200)={{0x100000000, 0x7}, 0x0, 0x9, 0x9, {0x1, 0x1}, 0xf166, 0x800}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) 16:59:29 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80d7, 0x8000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f00000004c0)=0x4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000580)={0x0, 0x7}, &(0x7f0000001640)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001680)={r3, 0x3}, &(0x7f00000016c0)=0x8) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb4f0209a292a3f6fc00493c006ad8dd7588c57cdbcee21ac2ef81e12966a94b000081b2e09caf9a4b396410d4f38849a28ee017a3d7088d2471d758b37ce324185318a020a8"], 0x4f, 0x1) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000640)=""/4096) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) getpeername$llc(r5, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000540)=0x10) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x5, 0x20000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80000, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000002c0)={0x1, 0xf08f}) 16:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200, 0x100) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x420401, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x400000, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000300)=0x80, 0x80800) r2 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:29 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x20000000021) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000100)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff19, 0x0, 0x0, 0x101aa) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) ioctl$UI_DEV_DESTROY(r0, 0x5502) 16:59:29 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80d7, 0x8000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f00000004c0)=0x4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000580)={0x0, 0x7}, &(0x7f0000001640)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001680)={r3, 0x3}, &(0x7f00000016c0)=0x8) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb4f0209a292a3f6fc00493c006ad8dd7588c57cdbcee21ac2ef81e12966a94b000081b2e09caf9a4b396410d4f38849a28ee017a3d7088d2471d758b37ce324185318a020a8"], 0x4f, 0x1) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000640)=""/4096) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) getpeername$llc(r5, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000540)=0x10) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x5, 0x20000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80000, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000002c0)={0x1, 0xf08f}) [ 394.586028] print_req_error: I/O error, dev loop0, sector 196 [ 394.592402] Buffer I/O error on dev loop0, logical block 49, lost async page write 16:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) fremovexattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73f81560aa3f00"/20]) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x7ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x5, 0xfff, 0x1f, 0x9, 0x1}, 0x14) open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x10) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000200)={0x9, 0x1, 0xfffffffffffffff7, 0x2, 0xf1}, 0xc) syz_genetlink_get_family_id$tipc2(0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x6) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x1, 0x180082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000540), 0x338, 0x81806) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x8, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000240)={0x54d6, r4}) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r5 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x80000001, 0x20002) sendfile(r1, r5, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x138, r6, 0x10, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x45b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff895}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3677}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x20000000021) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000100)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff19, 0x0, 0x0, 0x101aa) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) ioctl$UI_DEV_DESTROY(r0, 0x5502) 16:59:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 16:59:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) fremovexattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73f81560aa3f00"/20]) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:30 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80d7, 0x8000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f00000004c0)=0x4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000580)={0x0, 0x7}, &(0x7f0000001640)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001680)={r3, 0x3}, &(0x7f00000016c0)=0x8) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb4f0209a292a3f6fc00493c006ad8dd7588c57cdbcee21ac2ef81e12966a94b000081b2e09caf9a4b396410d4f38849a28ee017a3d7088d2471d758b37ce324185318a020a8"], 0x4f, 0x1) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000640)=""/4096) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) getpeername$llc(r5, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000540)=0x10) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x5, 0x20000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80000, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000002c0)={0x1, 0xf08f}) 16:59:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getgroups(0x1, &(0x7f0000000180)=[0xee00]) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r4, r5, 0x1000) write$P9_RRENAME(r3, &(0x7f0000000200)={0x7, 0x15, 0x1}, 0x7) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000240)) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) fremovexattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73f81560aa3f00"/20]) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffff, 0x80000) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0xffffffff7ffffffb, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x401) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:30 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$input_event(r2, &(0x7f0000000300)={{}, 0x17, 0xa50, 0x3}, 0x18) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4a00, 0x0) bind$isdn_base(r2, &(0x7f00000004c0)={0x22, 0x9, 0x7fff, 0x5, 0xffffffff}, 0x6) write$P9_RMKNOD(r3, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x82, 0x1, 0x6}}, 0x14) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000200)={0x0, @raw_data="592bc08da9501d1406950604fd12018f622c463a38935dce944f4be0d525f05f0af54cfa63cd57ad2765e8fc68c98842a10dd3dc170846e7141683d708b5d3059dc779ba40f362a86d6e751ce308b3e40e95721947868ead9580bd0cc19f805510af222ecffcacd965fe97d5f53b9f14eac5fde53cae44d7b0ff23eb449bb1b78b8de0e50043264e18841ffb7e107ce273e328fb8e236306af9350d906969847676032b6d43f70459c98efb004fdca247d6bdc09d39901f189c0ca63d4e2a0bc416a35e363987631"}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x2a, 0x100082) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x204000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={r1}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000640)={0x15, 0x110, 0xfa00, {r5, 0x7f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10000}}}, 0x118) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, 0x0, 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x400000000000009, 0x80) syz_genetlink_get_family_id$tipc2(0x0) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f00000000c0)=0xcc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @speck128}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r6, 0x4b69, 0x0) 16:59:31 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x2a, 0x100082) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x204000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={r1}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000640)={0x15, 0x110, 0xfa00, {r5, 0x7f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10000}}}, 0x118) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, 0x0, 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x400000000000009, 0x80) syz_genetlink_get_family_id$tipc2(0x0) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f00000000c0)=0xcc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @speck128}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r6, 0x4b69, 0x0) 16:59:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$input_event(r2, &(0x7f0000000300)={{}, 0x17, 0xa50, 0x3}, 0x18) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4a00, 0x0) bind$isdn_base(r2, &(0x7f00000004c0)={0x22, 0x9, 0x7fff, 0x5, 0xffffffff}, 0x6) write$P9_RMKNOD(r3, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x82, 0x1, 0x6}}, 0x14) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000200)={0x0, @raw_data="592bc08da9501d1406950604fd12018f622c463a38935dce944f4be0d525f05f0af54cfa63cd57ad2765e8fc68c98842a10dd3dc170846e7141683d708b5d3059dc779ba40f362a86d6e751ce308b3e40e95721947868ead9580bd0cc19f805510af222ecffcacd965fe97d5f53b9f14eac5fde53cae44d7b0ff23eb449bb1b78b8de0e50043264e18841ffb7e107ce273e328fb8e236306af9350d906969847676032b6d43f70459c98efb004fdca247d6bdc09d39901f189c0ca63d4e2a0bc416a35e363987631"}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x2a, 0x100082) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x204000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000280)={r1}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000640)={0x15, 0x110, 0xfa00, {r5, 0x7f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10000}}}, 0x118) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, 0x0, 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x400000000000009, 0x80) syz_genetlink_get_family_id$tipc2(0x0) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f00000000c0)=0xcc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @speck128}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r6, 0x4b69, 0x0) 16:59:31 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = dup(r1) write$input_event(r2, &(0x7f0000000300)={{}, 0x17, 0xa50, 0x3}, 0x18) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4a00, 0x0) bind$isdn_base(r2, &(0x7f00000004c0)={0x22, 0x9, 0x7fff, 0x5, 0xffffffff}, 0x6) write$P9_RMKNOD(r3, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x82, 0x1, 0x6}}, 0x14) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000200)={0x0, @raw_data="592bc08da9501d1406950604fd12018f622c463a38935dce944f4be0d525f05f0af54cfa63cd57ad2765e8fc68c98842a10dd3dc170846e7141683d708b5d3059dc779ba40f362a86d6e751ce308b3e40e95721947868ead9580bd0cc19f805510af222ecffcacd965fe97d5f53b9f14eac5fde53cae44d7b0ff23eb449bb1b78b8de0e50043264e18841ffb7e107ce273e328fb8e236306af9350d906969847676032b6d43f70459c98efb004fdca247d6bdc09d39901f189c0ca63d4e2a0bc416a35e363987631"}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000100)={0x8, 0x7, 0x7a, 0x101, 0x7, 0x3f, 0x43}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000140)) sendfile(r0, r1, 0x0, 0x20000102000007) r3 = getuid() setfsuid(r3) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = open(&(0x7f0000000100)='./file0\x00', 0x400, 0x20) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000004c0)={0x96, "f98c7aa740a2044e62516b6318670c9dcec2e69193caa33014e10f9b18242ed40e322fa610909fd903f1cf0b8b358b92cca6f3c038fd45a75b5b2f94a93744ab3f9cdaac8d2402b67a832a802715e6b342b558bceba44ffd84d13beee26710a3ee6b607e481916ecd00a7bb5ab4ef54bda95cde4f3b1029249a492aa22b22cbcdab936f32449a278ba2b921dcf3038a0cfe50db3e25f"}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) flistxattr(r0, &(0x7f0000000600)=""/165, 0xa5) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000200)={0xc, 0xdd, "30f6fd74b8fe09b2337163fbe6ee0cde3abf4c4aa92190bd4876cdd017e4a9f0d61a980b058be7b817d34574e75f64d3a7de076e4b3d6b30f901ed5b27598c652db266f67b3e66b94f34b9429debd0f2120837c9bde589a050fc773088d8daeac67fc2f0c4564416ea209c7c054c350d41a40871af71546995b8785def8949f6686517683191cc3da4d3723468a097f25bde94e1f7b398f081761f212f109b16634bb17e1cafb7d61635de25a16362eeb829c1dda52d1d56b1b0241bdca2eb0ebc365869150105bee00424dff24425494c76fd04360e83854246fe4a6e"}, 0xe3) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x0, 0x2}) sendfile(r1, r3, 0x0, 0x20000102000007) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f00000000c0)) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:31 executing program 4: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x410100) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000140)={0x2, 0x3, 0x0, 0x5, 'syz1\x00', 0x7c}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8a1, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = open(&(0x7f0000000100)='./file0\x00', 0x400, 0x20) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000004c0)={0x96, "f98c7aa740a2044e62516b6318670c9dcec2e69193caa33014e10f9b18242ed40e322fa610909fd903f1cf0b8b358b92cca6f3c038fd45a75b5b2f94a93744ab3f9cdaac8d2402b67a832a802715e6b342b558bceba44ffd84d13beee26710a3ee6b607e481916ecd00a7bb5ab4ef54bda95cde4f3b1029249a492aa22b22cbcdab936f32449a278ba2b921dcf3038a0cfe50db3e25f"}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) flistxattr(r0, &(0x7f0000000600)=""/165, 0xa5) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000200)={0xc, 0xdd, "30f6fd74b8fe09b2337163fbe6ee0cde3abf4c4aa92190bd4876cdd017e4a9f0d61a980b058be7b817d34574e75f64d3a7de076e4b3d6b30f901ed5b27598c652db266f67b3e66b94f34b9429debd0f2120837c9bde589a050fc773088d8daeac67fc2f0c4564416ea209c7c054c350d41a40871af71546995b8785def8949f6686517683191cc3da4d3723468a097f25bde94e1f7b398f081761f212f109b16634bb17e1cafb7d61635de25a16362eeb829c1dda52d1d56b1b0241bdca2eb0ebc365869150105bee00424dff24425494c76fd04360e83854246fe4a6e"}, 0xe3) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x0, 0x2}) sendfile(r1, r3, 0x0, 0x20000102000007) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f00000000c0)) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000100)=r3) 16:59:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = shmget(0x0, 0x3000, 0xc80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000240)=""/251) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000540)={0x7, 0x2, {0xffffffffffffffff, 0x3, 0x80000000, 0x3, 0x8db}}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0xc, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r2, 0x0, 0x20000102000007) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x28, &(0x7f00000004c0)}, 0x10) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:59:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x1c0000000000000, @local, 0x1}}, 0x8, 0x10001, 0x2, 0x3}, &(0x7f0000000140)=0x98) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$TIOCNOTTY(r2, 0x5422) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000100)=r3) 16:59:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = shmget(0x0, 0x3000, 0xc80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000240)=""/251) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000540)={0x7, 0x2, {0xffffffffffffffff, 0x3, 0x80000000, 0x3, 0x8db}}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0xc, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r2, 0x0, 0x20000102000007) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x28, &(0x7f00000004c0)}, 0x10) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:59:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000100)=r3) 16:59:32 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x410100) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000140)={0x2, 0x3, 0x0, 0x5, 'syz1\x00', 0x7c}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8a1, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x2) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x4, @rand_addr="46a973310cb04eae273f270bd9b62198", 0x401}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000640)=ANY=[@ANYRES32=r4, @ANYBLOB="0100d5009241396a7141729f6e9409257b4f63bceeeef0061209919f09c545ef37da97b989ce864b473fbb748d65aea27cbf837cd7d1c3cfe42286b51ee7245e0b7a9b24db123907cce34a69bd9267a2e8aa02b2888347d015562a8d680645adeb3a098d90008bbd3b4f52bb5961156ba0820b6f3496459d867f8778d614a50420af257e58f83306577ae5759e3306d256c570a69770b2670c6a0454e53a750cb375558b1df793f9518f93f6ff0393119974606c711590afa6d3e7f7c3ae234b217dbef27e093598c445c996621ab376a5ec15dfa2e154aeaf6bb6624e07d7e69c2f"], 0xdd) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0), 0x0) 16:59:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x10001, 0x101002) sendmsg$SEG6_CMD_SET_TUNSRC(r2, 0x0, 0x400c811) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = shmget(0x0, 0x3000, 0xc80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000240)=""/251) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000540)={0x7, 0x2, {0xffffffffffffffff, 0x3, 0x80000000, 0x3, 0x8db}}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0xc, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r2, 0x0, 0x20000102000007) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x28, &(0x7f00000004c0)}, 0x10) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:59:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:32 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x2) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x4, @rand_addr="46a973310cb04eae273f270bd9b62198", 0x401}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000640)=ANY=[@ANYRES32=r4, @ANYBLOB="0100d5009241396a7141729f6e9409257b4f63bceeeef0061209919f09c545ef37da97b989ce864b473fbb748d65aea27cbf837cd7d1c3cfe42286b51ee7245e0b7a9b24db123907cce34a69bd9267a2e8aa02b2888347d015562a8d680645adeb3a098d90008bbd3b4f52bb5961156ba0820b6f3496459d867f8778d614a50420af257e58f83306577ae5759e3306d256c570a69770b2670c6a0454e53a750cb375558b1df793f9518f93f6ff0393119974606c711590afa6d3e7f7c3ae234b217dbef27e093598c445c996621ab376a5ec15dfa2e154aeaf6bb6624e07d7e69c2f"], 0xdd) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0), 0x0) 16:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa0, r3, 0x204, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8001}, 0x0) getpeername$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x10001, 0x101002) sendmsg$SEG6_CMD_SET_TUNSRC(r2, 0x0, 0x400c811) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, 0x0) 16:59:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000065c0)='/dev/snapshot\x00', 0x202000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000006640)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000006740)={&(0x7f0000006600)={0x10, 0x0, 0x0, 0x1000018}, 0xc, &(0x7f0000006700)={&(0x7f0000006680)=ANY=[@ANYBLOB='h\b\x00\x00', @ANYRES16=r1, @ANYBLOB="300028bd7000ffdbdf2502000000040004000800050005000000080002000200000008000300cc00000014000400ffff00000000000001000000ee000000080006003600000008000200080000000c00040001040000e0ffffff0800030004000000"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) modify_ldt$write(0x1, &(0x7f0000005400)={0x4, 0x20101800, 0xffffffffffffffff, 0x4, 0x5, 0x100000001, 0x10001, 0xffff, 0x9, 0x9}, 0xfeef) recvmmsg(0xffffffffffffffff, &(0x7f00000062c0)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2, &(0x7f00000004c0)=""/236, 0xec}, 0xfffffffffffff498}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000640)=""/220, 0xdc}, {&(0x7f0000000740)=""/167, 0xa7}, {&(0x7f0000000800)=""/165, 0xa5}, {&(0x7f00000008c0)=""/155, 0x9b}, {&(0x7f0000000980)=""/3, 0x3}, {&(0x7f00000009c0)=""/207, 0xcf}, {&(0x7f0000000ac0)=""/233, 0xe9}], 0x7, &(0x7f0000000c40)=""/60, 0x3c}}, {{&(0x7f0000000c80)=@llc, 0x80, &(0x7f0000003100)=[{&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/149, 0x95}, {&(0x7f0000002dc0)=""/117, 0x75}, {&(0x7f0000002e40)=""/130, 0x82}, {&(0x7f0000002f00)=""/159, 0x9f}, {&(0x7f0000002fc0)=""/74, 0x4a}, {&(0x7f0000003040)=""/70, 0x46}, {&(0x7f00000030c0)=""/60, 0x3c}], 0x9, &(0x7f00000031c0)=""/231, 0xe7}}, {{&(0x7f00000032c0)=@caif, 0x80, &(0x7f0000005780)=[{&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/162, 0xa2}, {&(0x7f0000005400)}, {&(0x7f0000005440)=""/187, 0xbb}, {&(0x7f0000005500)=""/19, 0x13}, {&(0x7f0000005540)=""/202, 0xca}, {&(0x7f0000005640)=""/239, 0xef}, {&(0x7f0000005740)=""/31, 0x1f}], 0x9, &(0x7f0000005840)=""/174, 0xae}, 0x7fff}, {{&(0x7f0000005900)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000005d80)=[{&(0x7f0000005980)=""/87, 0x57}, {&(0x7f0000005a00)=""/69, 0x45}, {&(0x7f0000005a80)=""/251, 0xfb}, {&(0x7f0000005b80)=""/131, 0x83}, {&(0x7f0000005c40)=""/185, 0xb9}, {&(0x7f0000005d00)=""/104, 0x68}], 0x6, &(0x7f0000005e00)=""/7, 0x7}, 0x1}, {{&(0x7f0000005e40)=@sco, 0x80, &(0x7f0000006100)=[{&(0x7f0000005ec0)=""/21, 0x15}, {&(0x7f0000005f00)=""/157, 0x9d}, {&(0x7f0000005fc0)=""/171, 0xab}, {&(0x7f0000006080)=""/93, 0x5d}], 0x4}, 0xc8}, {{0x0, 0x0, &(0x7f0000006200)=[{&(0x7f0000006140)=""/179, 0xb3}], 0x1, &(0x7f0000006240)=""/126, 0x7e}, 0xbfe}], 0x7, 0x0, &(0x7f0000006480)={0x77359400}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000064c0)='/selinux/status\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000006500)='/dev/full\x00', 0x432000, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000006540)='/dev/qat_adf_ctl\x00', 0x1, 0x0) creat(&(0x7f0000006580)='./file0\x00', 0x4c) sendmsg$SEG6_CMD_SET_TUNSRC(r3, 0x0, 0x8) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000006780)={0x27, 0x0, 0x1, 0x4, 0x55c, 0x4000000000000000, "9d519cd2fff7751dff7fd117cc007d2e721c3ad31e9d7c88b609a1da20df7d2fd76dba4b4315f1c12ae915f7c028c0866946de9cbc710844e675de6d6965f7", 0x2a}, 0x60) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, 0x0) 16:59:33 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x2) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x4, @rand_addr="46a973310cb04eae273f270bd9b62198", 0x401}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000640)=ANY=[@ANYRES32=r4, @ANYBLOB="0100d5009241396a7141729f6e9409257b4f63bceeeef0061209919f09c545ef37da97b989ce864b473fbb748d65aea27cbf837cd7d1c3cfe42286b51ee7245e0b7a9b24db123907cce34a69bd9267a2e8aa02b2888347d015562a8d680645adeb3a098d90008bbd3b4f52bb5961156ba0820b6f3496459d867f8778d614a50420af257e58f83306577ae5759e3306d256c570a69770b2670c6a0454e53a750cb375558b1df793f9518f93f6ff0393119974606c711590afa6d3e7f7c3ae234b217dbef27e093598c445c996621ab376a5ec15dfa2e154aeaf6bb6624e07d7e69c2f"], 0xdd) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0), 0x0) 16:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x9, 0x5, 0x4}) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x9, 0x5, 0x4}) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000006c0)={'team0\x00', r3}) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000006c0)={'team0\x00', r3}) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x9, 0x5, 0x4}) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x5, 0x0, 0x10003, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000240)={r2, 0x54d95199}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(r1, 0x0, 0x40001) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x200000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000100)) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) fsetxattr(r0, &(0x7f00000000c0)=@random={'user.', ',wlan1[md5sumlo\x00'}, &(0x7f0000000100)='/\x00', 0x2, 0x2) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000200)={{0xff, 0x6}, 0x1, 0xfff, 0x5, {0x7, 0x4}, 0x6, 0x7fffffff}) sendmsg$alg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000640)="482f80438d5dc943edca5c7dfdcf10a35e5cb458e06cf3534cc733b967a92ec83ab04b102a95140286bd14643a2436531b0f20fe6c8c2cac4964edee145ef011a31d5291bfd174a8f73ff068b91b718ea632313e9651457c18588497c8a7cc6cfe297465bf0dffca59eccfa8c3cbb6a1bb6067ea304392dcda1a4eda188091232e7199f7ae12c3ba58880a27259a62b11839e3a6721c668069f68d45c75877b767c4c5823b6ee85efdb85be79510ce18aaa0f1f417f629b040265f56460180e83bc8", 0xc2}, {&(0x7f0000000740)="2ed7e84c61168f43d5e7a27579d4774fd732f75303e3ee51836a4051e11cb68608e946e4ff531c2134734c3f67c647a42189d578ae9d8e84676bc29da7dff0eac866c3b10695ca2a40b528447b19a0c678ba9873b35deeb47c7e976fc8c4c5a533a177d80186eca436afa877321af5ea7331ccd9e8904b9b6a878fd1c1f148ac92307d417e344d8422a7fd886a2af54e970cfff3f5918b0e0e720eecc198b810", 0xa0}], 0x2, &(0x7f0000000840)=[@iv={0xa8, 0x117, 0x2, 0x92, "45f6b068c8003eccaa5f953020330a81cf893edfed854406555fa3d76f8ad2b831ecfeab4186a6f469ca1f88bce937dbef57575a04f9d3ff4327ede07341ec221447a5fb11ac1df51f9d9403334978ff07e55b4769580b5572659f98da6b74f3237f1283fb11a9d1e88bcca5334b1d098a20cde9db7e36c0b34bbc03df9179e9265c11197921b2875354fe20b84e9a1b13cd"}], 0xa8, 0x48000}, 0x20000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x7f0, 0xaaed, 0x81, 0x8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)={r3, 0x7b, "296e0958142b765c63d0a874918914f3dcc046ded36c2bad9a25e5426dc0950fe160a6369e7717cf08b61cbfb0c2facfc572941f09cb46543aab4b6c88785204597185c1664e3e432b4d8f7e59acd7bf73449a880ca3376192daae4bf680e233acfb58feada4f02476eba981136027f381d7558acf3baa4841b3e6"}, &(0x7f0000000580)=0x83) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r3, 0x8000, 0xfffffffffffffffb, 0x90, 0x8}, 0x14) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000000c0)={0x0, 0x81, 0xba, 0x10001, 0x8, 0x5}) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x4e24, 0x4, @loopback, 0x3}}}, 0x3a) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000028c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000002900)={'nr0\x00', 0x9}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) ptrace$poke(0x5, r3, &(0x7f00000002c0), 0x80000000000000) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000300)={0xffffffff00000001, 0x0, 0x100000000, 0x9, 0xffffffffffffffff, 0x2}) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000100)=0x44) 16:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {0x0}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 16:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000200)={{0xff, 0x6}, 0x1, 0xfff, 0x5, {0x7, 0x4}, 0x6, 0x7fffffff}) sendmsg$alg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000640)="482f80438d5dc943edca5c7dfdcf10a35e5cb458e06cf3534cc733b967a92ec83ab04b102a95140286bd14643a2436531b0f20fe6c8c2cac4964edee145ef011a31d5291bfd174a8f73ff068b91b718ea632313e9651457c18588497c8a7cc6cfe297465bf0dffca59eccfa8c3cbb6a1bb6067ea304392dcda1a4eda188091232e7199f7ae12c3ba58880a27259a62b11839e3a6721c668069f68d45c75877b767c4c5823b6ee85efdb85be79510ce18aaa0f1f417f629b040265f56460180e83bc8", 0xc2}, {&(0x7f0000000740)="2ed7e84c61168f43d5e7a27579d4774fd732f75303e3ee51836a4051e11cb68608e946e4ff531c2134734c3f67c647a42189d578ae9d8e84676bc29da7dff0eac866c3b10695ca2a40b528447b19a0c678ba9873b35deeb47c7e976fc8c4c5a533a177d80186eca436afa877321af5ea7331ccd9e8904b9b6a878fd1c1f148ac92307d417e344d8422a7fd886a2af54e970cfff3f5918b0e0e720eecc198b810", 0xa0}], 0x2, &(0x7f0000000840)=[@iv={0xa8, 0x117, 0x2, 0x92, "45f6b068c8003eccaa5f953020330a81cf893edfed854406555fa3d76f8ad2b831ecfeab4186a6f469ca1f88bce937dbef57575a04f9d3ff4327ede07341ec221447a5fb11ac1df51f9d9403334978ff07e55b4769580b5572659f98da6b74f3237f1283fb11a9d1e88bcca5334b1d098a20cde9db7e36c0b34bbc03df9179e9265c11197921b2875354fe20b84e9a1b13cd"}], 0xa8, 0x48000}, 0x20000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x7f0, 0xaaed, 0x81, 0x8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)={r3, 0x7b, "296e0958142b765c63d0a874918914f3dcc046ded36c2bad9a25e5426dc0950fe160a6369e7717cf08b61cbfb0c2facfc572941f09cb46543aab4b6c88785204597185c1664e3e432b4d8f7e59acd7bf73449a880ca3376192daae4bf680e233acfb58feada4f02476eba981136027f381d7558acf3baa4841b3e6"}, &(0x7f0000000580)=0x83) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = accept$ax25(0xffffffffffffffff, &(0x7f0000000800)={{0x3, @rose}, [@rose, @default, @default, @bcast, @bcast, @rose, @null, @rose]}, &(0x7f0000000900)=0x3ab) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f00000007c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r3) sendfile(r0, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="5274e7a95958d230139fce89413bc54b4b8d4b7ac93bc5cfa4b9290a8ad1e7ad889f97615f25fe122750143e5c7a83c2a167fd8546826284cf1525fb6775044bcafd2916005886d4de2d2128b556cfef419f5ac16bd29132b995a02dcc8ccbeea5b7aa12b9c16f10e30ef91d31b08c0d1a4838dbafbf6e230075314d48233f18bd5f5908e2a2c6e3d199d56a876ee8d09074682956902ca8d89a0598c0a13cdc7ce79a6a4c3e33489065df0ac8938a3c1165bd7b8b7a3d52bd6b8b69cde7ae7a3d664635173d9c3f9dc7a1808ca25b7221a2f5844f", 0xd5}, {&(0x7f0000000200)}, {&(0x7f0000000240)="a9d812eb6652606f5d949848d6610596782e2dda70e474aff8a0488efbd1306e37ee6e678d81dba8213a2cbaa16606d9a83b526a2f827b3c3e13f85694a45ce8db5124d4de3d1805f249ba3aebe54c5731f18df89674c7e6217585db65aa0940ddc5981aed81ab61dc5bb6ea645030e9f67fc7be649ad69303ae5d59407dee96b482f65f441c182c989ac2962f6d6711febe931a1990baf1a625ebc713", 0x9d}, {&(0x7f00000004c0)="5491181c0a1ce969c9cce42aaecd90da89352a8552fea8d742e6b5ffa095bf7868d3b16374781c1206c21742847f0804fd022cbb0007f4b48142eb3ab6971995129d52578d6d2054c2", 0x49}], 0x4, &(0x7f0000000540)}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, 0x0) 16:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {0x0}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) io_setup(0x81, &(0x7f00000000c0)=0x0) io_submit(r3, 0x5, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x7f, r0, &(0x7f0000000100)="687999ea98026d0263f5d1c19fd2ebaedc1d2b3047af12e9aa07148157a1b9edc35cc9b5b4ad7f1beb509395f8708e5ab5446408ff478d02390b0f61d0c02f866d18ee30a69ab6c75c796164f3f3e2444eaa9ac9767f580a02e248e9c8d62543d13e376179f151572db84b27d89b5e247541c190343bb6e0ed30f645b1c1db7c5dfb65ebdacdbe7351ac8303423a18301021b17566f533a0ba1aeb8aa3c0a9279babd57edbe0fb2a0b", 0xa9, 0x100, 0x0, 0x1, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x6, r0, &(0x7f0000000240)="8b954f34163b6d01073d1b8c3aab4b1b59c785b318ad40053b299b34454a550ee374b678ec9c422ef11fc009a0eaf0cd37acb9505c77836a721cc1174b086f2c9d80fe86d89a8ddf81276f7e9987a2ed02f83b3b6e387186183aa1f71f587c", 0x5f, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xf, 0x8000, r1, &(0x7f00000004c0)="23feaa701e3e68feb6454256ac579bfbd96ac27131f1b36b6476b00978525f65ce881e15e6cd60c87e0b18fcf72c8d9c349f63dc2d8f97b370dd2c5c9b4fbcdd6332d91d6f6f25ad3c869d82a4918c87349b44e223f89b03b75e748015ab97e37b9e1196dd8f92d1226e087ba4c6de8c5674a2db48e50b6e231948aef123a2a360907c75c1e4eb2eb2ab65c6aceb803d2d04c5ac4add775550ae871f1b31ed794cf5279ab642d4b814a9d9a4b0b91c3f7b1a0197a6a66db9bba1c6e019f2f50b3f4354cc88a7489e0a9acdecfc95b0bd468d8310b5ec2c35b17876a207e5be91891d", 0xe2, 0x8}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0x1f, r0, &(0x7f0000000600)="d7c6745ddee3b8cf1a97f21bec9767da31d5f59deeafe859b05f9735ebbf26f08693dbd7c5d526c2740a37615ee6957d8fad7e9b07bfede1e21f20c505bf54f54251e21f7ec87e222dabe06c8711dfb3c4ddaac0db577a7e877dfcb523efbc7fbd2ece520c3e9c5900f7ab40b9cfc045615afaf61c98c0d87c99f9944c4ce2fd3f0648c6f90801303246bf776c2333e433d79c475c62f1db30e07487e123a8516c17fac238fef7607b988ac6b7303de262e04129c855d02d5f5cd45300405b8e9a1a5b162ba2ff0596b79fef752f323e34e9d0aeb6b97dd7f07506ead10e286a5dc8a2ed0ea504", 0xe7, 0x20, 0x0, 0x0, r2}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x1ff, r1, &(0x7f0000000740)="68d1442840326c5ecd87c2b742958a9c082b911a5c8e09587e263a44213a6eae6f314bed77b7132ea58a0d36c8d9bd106130ac7cbe7998888d9de82981e6", 0x3e, 0x7, 0x0, 0x2, r2}]) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r2, r0, 0x0, 0xfffffffffffffffc) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000200)={{0xff, 0x6}, 0x1, 0xfff, 0x5, {0x7, 0x4}, 0x6, 0x7fffffff}) sendmsg$alg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000640)="482f80438d5dc943edca5c7dfdcf10a35e5cb458e06cf3534cc733b967a92ec83ab04b102a95140286bd14643a2436531b0f20fe6c8c2cac4964edee145ef011a31d5291bfd174a8f73ff068b91b718ea632313e9651457c18588497c8a7cc6cfe297465bf0dffca59eccfa8c3cbb6a1bb6067ea304392dcda1a4eda188091232e7199f7ae12c3ba58880a27259a62b11839e3a6721c668069f68d45c75877b767c4c5823b6ee85efdb85be79510ce18aaa0f1f417f629b040265f56460180e83bc8", 0xc2}, {&(0x7f0000000740)="2ed7e84c61168f43d5e7a27579d4774fd732f75303e3ee51836a4051e11cb68608e946e4ff531c2134734c3f67c647a42189d578ae9d8e84676bc29da7dff0eac866c3b10695ca2a40b528447b19a0c678ba9873b35deeb47c7e976fc8c4c5a533a177d80186eca436afa877321af5ea7331ccd9e8904b9b6a878fd1c1f148ac92307d417e344d8422a7fd886a2af54e970cfff3f5918b0e0e720eecc198b810", 0xa0}], 0x2, &(0x7f0000000840)=[@iv={0xa8, 0x117, 0x2, 0x92, "45f6b068c8003eccaa5f953020330a81cf893edfed854406555fa3d76f8ad2b831ecfeab4186a6f469ca1f88bce937dbef57575a04f9d3ff4327ede07341ec221447a5fb11ac1df51f9d9403334978ff07e55b4769580b5572659f98da6b74f3237f1283fb11a9d1e88bcca5334b1d098a20cde9db7e36c0b34bbc03df9179e9265c11197921b2875354fe20b84e9a1b13cd"}], 0xa8, 0x48000}, 0x20000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x7f0, 0xaaed, 0x81, 0x8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)={r3, 0x7b, "296e0958142b765c63d0a874918914f3dcc046ded36c2bad9a25e5426dc0950fe160a6369e7717cf08b61cbfb0c2facfc572941f09cb46543aab4b6c88785204597185c1664e3e432b4d8f7e59acd7bf73449a880ca3376192daae4bf680e233acfb58feada4f02476eba981136027f381d7558acf3baa4841b3e6"}, &(0x7f0000000580)=0x83) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {0x0}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = accept$ax25(0xffffffffffffffff, &(0x7f0000000800)={{0x3, @rose}, [@rose, @default, @default, @bcast, @bcast, @rose, @null, @rose]}, &(0x7f0000000900)=0x3ab) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f00000007c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r3) sendfile(r0, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="5274e7a95958d230139fce89413bc54b4b8d4b7ac93bc5cfa4b9290a8ad1e7ad889f97615f25fe122750143e5c7a83c2a167fd8546826284cf1525fb6775044bcafd2916005886d4de2d2128b556cfef419f5ac16bd29132b995a02dcc8ccbeea5b7aa12b9c16f10e30ef91d31b08c0d1a4838dbafbf6e230075314d48233f18bd5f5908e2a2c6e3d199d56a876ee8d09074682956902ca8d89a0598c0a13cdc7ce79a6a4c3e33489065df0ac8938a3c1165bd7b8b7a3d52bd6b8b69cde7ae7a3d664635173d9c3f9dc7a1808ca25b7221a2f5844f", 0xd5}, {&(0x7f0000000200)}, {&(0x7f0000000240)="a9d812eb6652606f5d949848d6610596782e2dda70e474aff8a0488efbd1306e37ee6e678d81dba8213a2cbaa16606d9a83b526a2f827b3c3e13f85694a45ce8db5124d4de3d1805f249ba3aebe54c5731f18df89674c7e6217585db65aa0940ddc5981aed81ab61dc5bb6ea645030e9f67fc7be649ad69303ae5d59407dee96b482f65f441c182c989ac2962f6d6711febe931a1990baf1a625ebc713", 0x9d}, {&(0x7f00000004c0)="5491181c0a1ce969c9cce42aaecd90da89352a8552fea8d742e6b5ffa095bf7868d3b16374781c1206c21742847f0804fd022cbb0007f4b48142eb3ab6971995129d52578d6d2054c2", 0x49}], 0x4, &(0x7f0000000540)}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, 0x0) 16:59:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_mount_image$reiserfs(&(0x7f00000004c0)='reiserfs\x00', &(0x7f0000000500)='./file0\x00', 0x401, 0x1, &(0x7f0000000540)=[{&(0x7f0000000640)="507b3537b533fa58e163368d5dea81a3e3cb0c99a6552de82882918814c42add9d1079c114f45bd9d2cc77ba99345ce164bf6724503c6a6add76362c6fb668272353cb1461e70dbacee341066117700be3533feaf963c5a1583360501bc3b2c66eb14a64341c4b4ff6f6dd55ef5e8bed9158c2d10b8a3b49a639c9e690522b9a8990dca329a06f118f034fe270fe4e0dfe2463a22c2822d7a63e0f11463811c8aece1f3437978e2c82305959ed9169ada697b1dc3b7b8f8e92", 0xb9, 0x2}], 0x180402, &(0x7f0000000700)=ANY=[@ANYBLOB='resize=0x00000000000001ff,grpjquota,block-allocator=hashed_relocation,noacl,jqfmt=vfsold,errors=continue,errors=continue,errors=ro-remount,smackfshat=/proc/sys/net/ipv4/vs/sloppy_scTp\x00,mask=^MAY_READ,dont_appraise,appraise,\x00']) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f00000002c0)={0x4b}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x20, 0x9, 0x9, 0x0, r0, 0xdd, [], r3, r0, 0x2, 0x4}, 0x3c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) ioprio_get$pid(0x2, r4) 16:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x282040, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000100)=@netrom={'nr', 0x0}, 0x10) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x10000) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000100)) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) r3 = syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000200)={0x3, [0x6, 0x7, 0x5]}, &(0x7f0000000240)=0xa) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = accept$ax25(0xffffffffffffffff, &(0x7f0000000800)={{0x3, @rose}, [@rose, @default, @default, @bcast, @bcast, @rose, @null, @rose]}, &(0x7f0000000900)=0x3ab) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f00000007c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r3) sendfile(r0, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="5274e7a95958d230139fce89413bc54b4b8d4b7ac93bc5cfa4b9290a8ad1e7ad889f97615f25fe122750143e5c7a83c2a167fd8546826284cf1525fb6775044bcafd2916005886d4de2d2128b556cfef419f5ac16bd29132b995a02dcc8ccbeea5b7aa12b9c16f10e30ef91d31b08c0d1a4838dbafbf6e230075314d48233f18bd5f5908e2a2c6e3d199d56a876ee8d09074682956902ca8d89a0598c0a13cdc7ce79a6a4c3e33489065df0ac8938a3c1165bd7b8b7a3d52bd6b8b69cde7ae7a3d664635173d9c3f9dc7a1808ca25b7221a2f5844f", 0xd5}, {&(0x7f0000000200)}, {&(0x7f0000000240)="a9d812eb6652606f5d949848d6610596782e2dda70e474aff8a0488efbd1306e37ee6e678d81dba8213a2cbaa16606d9a83b526a2f827b3c3e13f85694a45ce8db5124d4de3d1805f249ba3aebe54c5731f18df89674c7e6217585db65aa0940ddc5981aed81ab61dc5bb6ea645030e9f67fc7be649ad69303ae5d59407dee96b482f65f441c182c989ac2962f6d6711febe931a1990baf1a625ebc713", 0x9d}, {&(0x7f00000004c0)="5491181c0a1ce969c9cce42aaecd90da89352a8552fea8d742e6b5ffa095bf7868d3b16374781c1206c21742847f0804fd022cbb0007f4b48142eb3ab6971995129d52578d6d2054c2", 0x49}], 0x4, &(0x7f0000000540)}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_mount_image$reiserfs(&(0x7f00000004c0)='reiserfs\x00', &(0x7f0000000500)='./file0\x00', 0x401, 0x1, &(0x7f0000000540)=[{&(0x7f0000000640)="507b3537b533fa58e163368d5dea81a3e3cb0c99a6552de82882918814c42add9d1079c114f45bd9d2cc77ba99345ce164bf6724503c6a6add76362c6fb668272353cb1461e70dbacee341066117700be3533feaf963c5a1583360501bc3b2c66eb14a64341c4b4ff6f6dd55ef5e8bed9158c2d10b8a3b49a639c9e690522b9a8990dca329a06f118f034fe270fe4e0dfe2463a22c2822d7a63e0f11463811c8aece1f3437978e2c82305959ed9169ada697b1dc3b7b8f8e92", 0xb9, 0x2}], 0x180402, &(0x7f0000000700)=ANY=[@ANYBLOB='resize=0x00000000000001ff,grpjquota,block-allocator=hashed_relocation,noacl,jqfmt=vfsold,errors=continue,errors=continue,errors=ro-remount,smackfshat=/proc/sys/net/ipv4/vs/sloppy_scTp\x00,mask=^MAY_READ,dont_appraise,appraise,\x00']) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f00000002c0)={0x4b}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x20, 0x9, 0x9, 0x0, r0, 0xdd, [], r3, r0, 0x2, 0x4}, 0x3c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) ioprio_get$pid(0x2, r4) [ 400.076285] print_req_error: I/O error, dev loop0, sector 256 [ 400.082455] Buffer I/O error on dev loop0, logical block 32, lost async page write 16:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x39) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'gretap0\x00', r3}) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x3, 0x1, 0x80000000, 0x3, 0x20}, 0xc) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe9", 0x1a}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffdc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x41, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r2 = socket$caif_stream(0x25, 0x1, 0x5) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast2}}) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ppoll(&(0x7f00000000c0)=[{r3, 0x2080}, {r3, 0x200}, {r1, 0x2001}, {r0, 0x8000}, {r1, 0x9088}, {r1, 0x1408}, {r3, 0x5080}, {r0, 0x40}, {r0}, {r3, 0x1200}], 0xa, &(0x7f0000000200), &(0x7f0000000240)={0xfffffffffffffff8}, 0x8) sendfile(r1, r3, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:35 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0xe212, 0x0) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100), r8, 0x0, 0x1, 0x4}}, 0x20) 16:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe9", 0x1a}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) mq_open(&(0x7f00000000c0)='ppp1md5sumkeyringvboxnet0proc\x00', 0x802, 0x180, &(0x7f0000000100)={0x7, 0x8, 0x4, 0x9, 0x8d, 0x1, 0x39}) 16:59:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x40001) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe9", 0x1a}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 400.453973] print_req_error: I/O error, dev loop0, sector 256 [ 400.459984] Buffer I/O error on dev loop0, logical block 32, lost async page write 16:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) 16:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) mq_open(&(0x7f00000000c0)='ppp1md5sumkeyringvboxnet0proc\x00', 0x802, 0x180, &(0x7f0000000100)={0x7, 0x8, 0x4, 0x9, 0x8d, 0x1, 0x39}) 16:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) socket$inet(0x2, 0x2, 0x80000001) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d", 0x27}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d", 0x27}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) socket$inet(0x2, 0x2, 0x80000001) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0xe212, 0x0) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100), r8, 0x0, 0x1, 0x4}}, 0x20) 16:59:38 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) sendmsg$unix(r1, &(0x7f0000000180)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000200)="1a62dbdecb19c5d7ed85b3bab60c9ca7b17e2c7de6944a174f5eb891a970851396983c1e5b9b5f50b4872038aadad1b2f43a42591ec47504afa3cbf99d3a758715b367c31a44d9cf788b3080704317404ab956a1aef5c28dfdcbbd0c6e9f943d492f932f63bcd5a60b535dcc902c52915d88f6e734ac49038424a538a540368a942249bee01d440260664939083d87bdfda1a62923901af9360445ec550630bb64c892cb49ae1ebaab211612f726ca031afdcf2f2434e0efd454c1", 0xbb}, {&(0x7f00000004c0)="0a68823be5c66c06509042bdddb0f515faa031b681972620326f90a4c47b3f0ec966bb1d6e8feb7582515af02d3ed0a772bc6dffe16a2b92d1ca3c32d984599782f97fcc5e6f2b7a1828917cf2018c1590540eac8c52d92d589e8322310f4dd434ba1b409ef85abf589fbd83b3bf1734f7d3d1fa11e380baefab157562788d0fb60aac4d249493879eb3002429c2cf922d5e78caeefcef458573d0deeaf0129e5747aeec4eb2b46a17e91121e844c625b239328601608af7c57ace99b9f229cbe135d0552a1fbae8d35d7f2947661e03b21550265b79a70381fa37327aadc2310b17f1a72eabbde5b85d", 0xea}], 0x2, &(0x7f00000002c0)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r1, r0]}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r1, r0, r1, r1]}}], 0x68, 0x800}, 0x4000) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) io_setup(0xc4ec, &(0x7f0000000600)=0x0) io_cancel(r4, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xc0000000000, r2, &(0x7f0000000640)="da400cd6f88c9fc663d9b9fbc9b204ada8ac408b85c20fec53ffdfacf01821e12a2e5ecdf0ce44a162596b63676797c8f93825c16bf18f1c045b2a8612e59fc007329dbbbed4ad53f4b70356ba7b4b0dcd7eefb97b5af5c78c9f873dcd25c345243a1cd54e48c153a9ba15b41d72f88499a1fdae4509c5db6a3446ff816647cab391b54c3948d16fa45dfbea477a02efd264ccfa7dd56f13ae48e32fec82004a23e5a1938bc7c9b8ea75bd81d2fa8568b2eaf0da7155d047", 0xb8, 0x7, 0x0, 0x2, r3}, &(0x7f0000000740)) 16:59:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) mq_open(&(0x7f00000000c0)='ppp1md5sumkeyringvboxnet0proc\x00', 0x802, 0x180, &(0x7f0000000100)={0x7, 0x8, 0x4, 0x9, 0x8d, 0x1, 0x39}) 16:59:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d", 0x27}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) socket$inet(0x2, 0x2, 0x80000001) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, 0x0) 16:59:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000180)={0xffffffff, 0x2, 0x5, "59d5000046208cdad84585e031950000000000000000002cf02d9b00", 0x38323151}) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) 16:59:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000180)={0xffffffff, 0x2, 0x5, "59d5000046208cdad84585e031950000000000000000002cf02d9b00", 0x38323151}) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) 16:59:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7", 0x2e}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 403.451241] print_req_error: I/O error, dev loop0, sector 0 16:59:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000180)={0xffffffff, 0x2, 0x5, "59d5000046208cdad84585e031950000000000000000002cf02d9b00", 0x38323151}) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) 16:59:38 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7", 0x2e}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:38 executing program 4 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 16:59:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0xe212, 0x0) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100), r8, 0x0, 0x1, 0x4}}, 0x20) 16:59:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) 16:59:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x20100) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7", 0x2e}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:41 executing program 0 (fault-call:10 fault-nth:0): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) rt_sigsuspend(&(0x7f0000000040)={0xfffffffffffffffc}, 0x8) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000000080)={0xffffffff, "26a4e77ac161a11cc8a49c3a55e6867539ed6db73dcbc9b30c9f4a63d7a72b8d", 0x3, 0x1}) 16:59:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 16:59:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9", 0x31}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 406.477183] FAULT_INJECTION: forcing a failure. [ 406.477183] name failslab, interval 1, probability 0, space 0, times 0 [ 406.498120] CPU: 1 PID: 18488 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 406.505377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.514758] Call Trace: [ 406.514818] dump_stack+0x138/0x19c [ 406.514839] should_fail.cold+0x10f/0x159 [ 406.514857] should_failslab+0xdb/0x130 [ 406.514873] kmem_cache_alloc_trace+0x2e9/0x790 [ 406.514887] ? mutex_trylock+0x1c0/0x1c0 [ 406.514902] ? retint_kernel+0x2d/0x2d [ 406.514919] loop_add+0x88/0x850 [ 406.514934] ? transfer_xor+0x360/0x360 [ 406.514948] ? radix_tree_lookup+0x22/0x30 [ 406.514960] loop_control_ioctl+0x10c/0x2f0 [ 406.514972] ? loop_add+0x850/0x850 [ 406.541958] ? do_vfs_ioctl+0x74f/0x1060 [ 406.541971] ? loop_add+0x850/0x850 [ 406.541982] do_vfs_ioctl+0x7ae/0x1060 16:59:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) [ 406.541996] ? selinux_file_mprotect+0x5d0/0x5d0 [ 406.542008] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.542019] ? ioctl_preallocate+0x1c0/0x1c0 [ 406.542030] ? check_preemption_disabled+0x3c/0x250 [ 406.542039] ? retint_kernel+0x2d/0x2d [ 406.542056] ? security_file_ioctl+0x89/0xb0 [ 406.542068] SyS_ioctl+0x8f/0xc0 [ 406.542077] ? do_vfs_ioctl+0x1060/0x1060 [ 406.542088] do_syscall_64+0x1e8/0x640 [ 406.542098] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:59:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9", 0x31}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:41 executing program 0 (fault-call:10 fault-nth:1): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) [ 406.542114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 406.542126] RIP: 0033:0x459829 [ 406.561809] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 406.561823] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 406.561829] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 406.561836] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 406.561843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 406.561849] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) [ 406.915461] FAULT_INJECTION: forcing a failure. [ 406.915461] name failslab, interval 1, probability 0, space 0, times 0 [ 406.927289] CPU: 0 PID: 18511 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 406.934534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.943908] Call Trace: [ 406.946517] dump_stack+0x138/0x19c [ 406.950143] should_fail.cold+0x10f/0x159 [ 406.954292] should_failslab+0xdb/0x130 [ 406.958273] kmem_cache_alloc_node_trace+0x280/0x770 [ 406.963372] ? retint_kernel+0x2d/0x2d [ 406.967295] __kmalloc_node+0x3d/0x80 [ 406.971109] blk_mq_alloc_tag_set+0x27c/0x840 [ 406.975631] ? retint_kernel+0x2d/0x2d [ 406.979533] loop_add+0x2b9/0x850 [ 406.982985] ? transfer_xor+0x360/0x360 [ 406.986972] ? radix_tree_lookup+0x22/0x30 [ 406.991215] loop_control_ioctl+0x10c/0x2f0 [ 406.995537] ? loop_add+0x850/0x850 [ 406.999160] ? do_vfs_ioctl+0x83/0x1060 [ 407.003126] ? loop_add+0x850/0x850 [ 407.006744] do_vfs_ioctl+0x7ae/0x1060 [ 407.010631] ? selinux_file_mprotect+0x5d0/0x5d0 [ 407.015382] ? lock_downgrade+0x6e0/0x6e0 [ 407.019534] ? ioctl_preallocate+0x1c0/0x1c0 [ 407.023965] ? __fget+0x237/0x370 [ 407.027436] ? security_file_ioctl+0x89/0xb0 [ 407.031853] SyS_ioctl+0x8f/0xc0 [ 407.035248] ? do_vfs_ioctl+0x1060/0x1060 [ 407.039403] do_syscall_64+0x1e8/0x640 [ 407.043283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.048116] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.053308] RIP: 0033:0x459829 [ 407.056827] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.064553] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 407.071822] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 407.079101] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 407.086373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 407.093653] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:44 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0xe212, 0x0) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x0, 0x2}}, 0x20) 16:59:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140)=0x1, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 16:59:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x90000, 0x46) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) r1 = dup3(r0, r0, 0x80000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000180)={0x6, 0x9}) fdatasync(r1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x800, 0x0, 0x10001, 0x10001}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000000c0)={0x2, r4}) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) r5 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9", 0x31}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:44 executing program 0 (fault-call:10 fault-nth:2): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x30f10000000, 0x800) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x3}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000200)={'bcsh0\x00', 0x1}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x2004, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000040)={0x6, 0x0, [{0x8001, 0x6, 0x0, 0x0, @irqchip={0x401, 0x7}}, {0x7, 0x7, 0x0, 0x0, @sint={0xc74, 0x6}}, {0x5, 0x2, 0x0, 0x0, @irqchip={0x3, 0x5792}}, {0x3f, 0x6, 0x0, 0x0, @irqchip={0xfff, 0x69}}, {0x81, 0x7, 0x0, 0x0, @sint={0x6, 0x8}}, {0x5, 0x3, 0x0, 0x0, @sint={0x6, 0x3}}]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)) 16:59:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) 16:59:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b586", 0x33}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000000000000ffffff7f030000000000000000000000080000000000000003000000000000000700000000000000050000000100008009000000030000000000000000000000000000000010000004000000000000000000000000000000000000000000000000040000020000000000000000000000ff0f000005000000090000000000000000000000000000000000000000000000a19e4f2e03000000000000000000000007000000090000000000000000000000000000000000000000000000000000000500000004000000000000000000000099000000060000000300000000000000000000000000000000000000000000007745c954b4f0af8f8d3be54e2fdaabd43c01c7fbb2cef07bd465dd0acec5bda1327075ced8386f403fd42d4f3c31854b6ca5090ce4b566dbdfec5b339c4505d7358a7b81b723500262699ccaa05f3834bf0dc3397d51001a8259cd960a06d189e648e700d665d1b906c5fb14d94aaf1759992a8e7051d5de89fff496b3fd5ffa"]) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 409.595653] FAULT_INJECTION: forcing a failure. [ 409.595653] name failslab, interval 1, probability 0, space 0, times 0 [ 409.610933] CPU: 1 PID: 18532 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 409.618574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.627940] Call Trace: [ 409.630585] dump_stack+0x138/0x19c [ 409.634239] should_fail.cold+0x10f/0x159 [ 409.638492] should_failslab+0xdb/0x130 [ 409.642478] kmem_cache_alloc_node_trace+0x280/0x770 [ 409.647624] ? retint_kernel+0x2d/0x2d [ 409.651527] ? kasan_unpoison_shadow+0x35/0x50 [ 409.656154] __kmalloc_node+0x3d/0x80 [ 409.659957] blk_mq_alloc_tag_set+0x30c/0x840 [ 409.664461] loop_add+0x2b9/0x850 [ 409.667915] ? transfer_xor+0x360/0x360 [ 409.671893] loop_control_ioctl+0x10c/0x2f0 [ 409.676223] ? loop_add+0x850/0x850 [ 409.679850] ? loop_add+0x850/0x850 [ 409.683479] do_vfs_ioctl+0x7ae/0x1060 [ 409.687370] ? selinux_file_mprotect+0x5d0/0x5d0 [ 409.693656] ? lock_downgrade+0x6e0/0x6e0 [ 409.697818] ? ioctl_preallocate+0x1c0/0x1c0 [ 409.702255] ? __fget+0x237/0x370 [ 409.705755] ? security_file_ioctl+0x89/0xb0 [ 409.710166] SyS_ioctl+0x8f/0xc0 [ 409.713523] ? do_vfs_ioctl+0x1060/0x1060 [ 409.717669] do_syscall_64+0x1e8/0x640 [ 409.721556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.726406] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 409.731594] RIP: 0033:0x459829 [ 409.734778] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:59:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400002, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 409.742492] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 409.749770] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 409.757045] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 409.764322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 409.771601] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) socket$inet(0x2, 0x3, 0x19) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 16:59:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b586", 0x33}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:47 executing program 0 (fault-call:10 fault-nth:3): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="442e9602dd959a92"]) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) 16:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2c7}, 0x8) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 16:59:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b586", 0x33}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:47 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x2000000000, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0xe212, 0x0) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) 16:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f00000001c0)=0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) 16:59:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='nUUU\x00\x00\x00\f']) 16:59:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 412.575260] FAULT_INJECTION: forcing a failure. [ 412.575260] name failslab, interval 1, probability 0, space 0, times 0 [ 412.600896] CPU: 0 PID: 18578 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 412.608028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.617412] Call Trace: [ 412.620014] dump_stack+0x138/0x19c [ 412.623682] should_fail.cold+0x10f/0x159 [ 412.627849] should_failslab+0xdb/0x130 [ 412.631837] kmem_cache_alloc_node_trace+0x280/0x770 [ 412.636944] ? find_next_bit+0x28/0x30 [ 412.644559] blk_mq_init_tags+0x67/0x290 [ 412.650633] blk_mq_alloc_rq_map+0x97/0x220 [ 412.654962] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 412.659465] blk_mq_alloc_tag_set+0x4a4/0x840 [ 412.664024] loop_add+0x2b9/0x850 [ 412.667478] ? transfer_xor+0x360/0x360 [ 412.671445] ? radix_tree_lookup+0x22/0x30 [ 412.675690] loop_control_ioctl+0x10c/0x2f0 [ 412.680014] ? loop_add+0x850/0x850 [ 412.683636] ? loop_add+0x850/0x850 [ 412.687273] do_vfs_ioctl+0x7ae/0x1060 [ 412.691157] ? selinux_file_mprotect+0x5d0/0x5d0 [ 412.695917] ? lock_downgrade+0x6e0/0x6e0 [ 412.700091] ? ioctl_preallocate+0x1c0/0x1c0 [ 412.704513] ? __fget+0x237/0x370 [ 412.707983] ? security_file_ioctl+0x89/0xb0 [ 412.712418] SyS_ioctl+0x8f/0xc0 [ 412.715786] ? do_vfs_ioctl+0x1060/0x1060 [ 412.719943] do_syscall_64+0x1e8/0x640 [ 412.723822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.728691] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 412.733883] RIP: 0033:0x459829 [ 412.737061] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.744765] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 412.752054] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 412.759324] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 412.766590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 16:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x2, 0x3, 0x19) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000001c0)=0x5) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) 16:59:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x10000, 0x101000) r2 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x0, 0x2) sendto$ax25(r1, &(0x7f0000000200)="23dd1776513f659c4bce10d24270948d8abab529ac415795d0a5b2ce67ee23729a2c2cc1058dcd18fdd126e3a78e2ba411045aa07acfd3ee9606f38cbb2b6f5d87f4cf773a9c67c6e956ac0f231f40100a1d38188c87dbb50a6cf1f4cf4386bd183d0bb4b44ef3264455274c63844298b794b780b7b7eef490ad2b8f414a1bb875332afc3122dae4764c31616ddf3812e3fe53d86312762cb25a05c5add789a133ef0a2b12b9f337e94707ac6659776d1f4c93af052d0455c988ca4771be8adf3103236d7a23e23fd798e079501b45b842e5ae74c747c53ef72159e26cf9d3", 0xdf, 0x4800, &(0x7f0000000140)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}, 0x48) dup3(r2, r1, 0x80000) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x6}, 0x0, {0x2, 0x4e21, @empty}, 'bcsf0\x00'}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) socket$pptp(0x18, 0x1, 0x2) [ 412.773936] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 412.788902] blk-mq: reduced tag depth (128 -> 64) 16:59:47 executing program 0 (fault-call:10 fault-nth:4): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 16:59:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x2, 0x3, 0x19) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="52d2ce77c8c1c599feaf83965597ca461d09f7b4bde5f63a73623296816d481db31d93212b71f864b65858dff248d88942b8da394a899821a09d00d8a669268f10605197b8a4ddc7d5547111e2bd8d", 0x4f}, {&(0x7f0000000100)="3ff0d48494707394dd6fbea23ec849104481f69a701a17539ae2c5c85720559002af4e16740e17ba77de15fa4cc51784598c862e9aa60e016d4248c6f3e6ab40ea25c6dc92c4fa5fc72d7bcd8b1ac2df8abfdbb626ee1ce168831662d1b8635fc2c8ec324d5b33ad2abe5a8a1fcd351cae374b20c627001774fbd3e97ea414bdba5e255e9c8361c6655dce9585eff6114cb76ede4b44082659e955d4cbde57898ec3a57cce350e47df365ecc53ba904bc31662136b54cc1be2096f665be73a8bf311bd44c457adace9814ee3750e4ef62cc42b03ae4bef6312c224bd53964d8ec8", 0xe1}, {&(0x7f0000000240)="39f4168548d3b35726e25807767b6bbbff66f9d90c41177b9675cb41e59c045daee9ac8bbb4df0ce18c06210e7", 0x2d}, {&(0x7f0000000280)="ff162797e4e0d2283f0869a9497940035da9986954b5651e96ee2b5b628b9596fe74e57c8c31e4dbf5609f613471e51f58281660d64ccb48ba899aa9a0e5f9aa15ec97c7dd8d280dfd42c641396a3a5ef257dce6b35a9b6920d9b1d6e19f", 0x5e}, {&(0x7f0000000300)="80a48842722fdbb63103f974a34e1392eef1019e8db7e9eef5bb0987d959782c9a4e384d3d88236080d428d67fe939f90ec61335618abdf03722ecab0e1cf1f593f878324f2091146a057013cad8fdafbe7b02ceff866f06c1d8d21d23e727dd8efcefb3e3decc810d9d2103e00f8239bba7dff0b000bbbd7be58badc36d07ae6954bbfc295f8d75299ca4d635d371781cf65996741869cbe9489ab9ae5ecaf6ad99302210e5bb1536c959c4a4fc1d997379592e664e1a46f225fccb75ea39681401f04846fd3da8d8a60594ac152db89e12e654329a0b6a06c0", 0xda}, {&(0x7f0000000400)="16c2e72e7d8871b909580d866ad99975698d1a898075379c2f66d647530bc22f04aa7909ab77c97922f38a7569b3852fb553b2f13a1b67586c7ca1ceb65d85fbd2e9b9a0f05f43e754abd09a36a62f4db5ec3c26fa1566c80a143d235f5ee7b236102715ef2e974cc35c765397e4b498416a4c284023378cda405f4a87b4a75eea9e24afd6effea2e905141a7e9330428183aa3e54614d817863bc781eead871bf5ac641e201c94584cc9a1404744e52403b3cbcb033f15bf5b34705755fbb39493fc64537d96206da745105753cac76f32221a45983b270f35ac9642df61df0a8ab6888d78b1c5223a2b09381", 0xed}, {&(0x7f0000000500)="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", 0x1000}], 0x7, &(0x7f00000017c0)=ANY=[@ANYBLOB="380000000000000017010000020000001f000000746fad1aba56b5d366220b3caf1dedea6786f9f0a386b249168b80cdce66c400000000001800000000000000170100000400000009000000000000003800000000000000170100000200000021000000e9de01b68146dc0d22ab4203f7e542ef79bb0812bf9998a615f9b563dead619ff6000000580000000000000017010000020000003d000000fb4c2891e7df042faad3a50fd03673571e3cb9d09396c6e5a8c23bc815cb9c78b825e73201c1f39d86af8acb62a5d3e712d9be57e85a6f1a560ca6e2170000000000000018000000000000001701000004000000280600000000000018000000000000001701000004000000bd05000000000000180000000000000017010000030000000000000000000000180000000000000017010000040000000000000000000000180000000000000017010000030000000100000000000000a80000000000000017010000020000008f000000c0b24d57584088b77b202a29c3d1885778b11db587053557ba2e641d571826af00dfc894677598e7f768dde707c00d54546ed523ccdab0e35e6dc84291e366fefd6aee22da477dd763bddd492a686136a39093714e181c4f8e00b0cf05120bc20ff9f8c1e1cf11da234f10ee425bb24b81fd4ff353ac1587b3eb28298019c70d472b1b98a6d7f8e56fa5cbaf8c6994000000000095d64bd788a10c"], 0x200, 0x4000}, 0x40) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0xfffffffffffffffd) ioctl(r0, 0x40, &(0x7f0000001580)="38355c0eaf39f75dc01cea5d9980ac52ebb0aa440d81e2e8f0372c9fdf9721d51f10e8ef718b7c81b2d0d1846a13f2d81caf0a33ac4eab52e7e8d8a6754028ea64879c4bbdb4f6cd050df48770ef8c1fa34adf03857796fafec47b4e1cd2f9aeb29f5f80e3cd87a1759d16d9d11a85b9c4c8a8226eeea90450978c73f45912559454540411800ea3235c877eee94a4e4d9e1a3d6") ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 413.106470] FAULT_INJECTION: forcing a failure. [ 413.106470] name failslab, interval 1, probability 0, space 0, times 0 [ 413.136373] CPU: 1 PID: 18603 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 413.143502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.153134] Call Trace: [ 413.155746] dump_stack+0x138/0x19c [ 413.159381] should_fail.cold+0x10f/0x159 [ 413.163916] should_failslab+0xdb/0x130 [ 413.167888] kmem_cache_alloc_node_trace+0x280/0x770 [ 413.172997] ? check_preemption_disabled+0x3c/0x250 [ 413.178019] __kmalloc_node+0x3d/0x80 [ 413.181815] sbitmap_init_node+0x251/0x3e0 [ 413.186052] sbitmap_queue_init_node+0x3a/0x5e0 [ 413.190716] ? find_next_bit+0x28/0x30 [ 413.194608] blk_mq_init_tags+0xfa/0x290 [ 413.198843] blk_mq_alloc_rq_map+0x97/0x220 [ 413.203462] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 413.207971] blk_mq_alloc_tag_set+0x4a4/0x840 [ 413.212482] loop_add+0x2b9/0x850 [ 413.215931] ? transfer_xor+0x360/0x360 [ 413.219897] ? radix_tree_lookup+0x22/0x30 [ 413.224129] loop_control_ioctl+0x10c/0x2f0 [ 413.228445] ? loop_add+0x850/0x850 [ 413.232065] ? do_vfs_ioctl+0x83/0x1060 [ 413.236046] ? loop_add+0x850/0x850 [ 413.239662] do_vfs_ioctl+0x7ae/0x1060 [ 413.243559] ? selinux_file_mprotect+0x5d0/0x5d0 [ 413.248309] ? lock_downgrade+0x6e0/0x6e0 [ 413.252450] ? ioctl_preallocate+0x1c0/0x1c0 [ 413.256888] ? __fget+0x237/0x370 [ 413.260342] ? security_file_ioctl+0x89/0xb0 [ 413.264748] SyS_ioctl+0x8f/0xc0 [ 413.268106] ? do_vfs_ioctl+0x1060/0x1060 [ 413.272259] do_syscall_64+0x1e8/0x640 [ 413.276141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.280984] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.286187] RIP: 0033:0x459829 [ 413.289365] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.297086] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 413.304354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 413.311637] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 413.318896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 413.326157] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x2, 0x3, 0x19) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) [ 413.361397] blk-mq: reduced tag depth (128 -> 64) 16:59:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x11, 0x0, 0x0, "538bfd5ce052a2a21d57dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:50 executing program 4: lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=@known='system.sockprotoname\x00', &(0x7f0000000280)='(proc.\x00', 0x7, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x5, 0x4000) bind$bt_rfcomm(r0, &(0x7f00000003c0)={0x1f, {0x8001, 0xff, 0xffff, 0xc15, 0xff, 0x8}, 0x8}, 0xa) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x8000000000800, 0x0) readlinkat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/45, 0x2d) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000002c0)=0xffffffff) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000300)=0x4) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={'nlmon0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000440)=ANY=[@ANYBLOB="ad405200e42b45ce80d32b8de86cdc70b0791a2a10059baf142ff9c0e6758d8a717dbf86f38fff8d4bdf09fa"]) 16:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x2, 0x3, 0x19) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:50 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) 16:59:50 executing program 0 (fault-call:10 fault-nth:5): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="b052be0c2a56cbd54ad1e7ef1eb22e0dbdc5b69fb3d78ebe3ba03c7b3430cbac4a000000000000009bcceb7eb6cac26fd1ba9dfe08aad2f4cc5d3e78ba167e20180c5891d325db2c2e9dd46eda73ca984aadbbcd278fe05f9c6365c2132fadaf9ecb5f12f6836afa20dba0fd94613151533b4f4234170333c3d4fe8ab2d093a16f00b7c7bfe3c65fb290e98d"]) 16:59:50 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8000, 0x111400) fstatfs(r0, &(0x7f0000000080)=""/158) [ 415.706832] FAULT_INJECTION: forcing a failure. [ 415.706832] name failslab, interval 1, probability 0, space 0, times 0 [ 415.745829] CPU: 1 PID: 18638 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 415.752968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.762336] Call Trace: [ 415.764931] dump_stack+0x138/0x19c [ 415.768564] should_fail.cold+0x10f/0x159 [ 415.772714] should_failslab+0xdb/0x130 [ 415.776692] kmem_cache_alloc_node_trace+0x280/0x770 [ 415.781797] sbitmap_queue_init_node+0x294/0x5e0 [ 415.786558] blk_mq_init_tags+0xfa/0x290 [ 415.790615] blk_mq_alloc_rq_map+0x97/0x220 [ 415.794932] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 415.799422] blk_mq_alloc_tag_set+0x4a4/0x840 [ 415.803921] loop_add+0x2b9/0x850 [ 415.807368] ? transfer_xor+0x360/0x360 [ 415.811339] ? radix_tree_lookup+0x22/0x30 [ 415.815573] loop_control_ioctl+0x10c/0x2f0 [ 415.819889] ? loop_add+0x850/0x850 [ 415.823659] ? loop_add+0x850/0x850 [ 415.827281] do_vfs_ioctl+0x7ae/0x1060 [ 415.831168] ? selinux_file_mprotect+0x5d0/0x5d0 [ 415.835916] ? lock_downgrade+0x6e0/0x6e0 [ 415.840078] ? ioctl_preallocate+0x1c0/0x1c0 [ 415.844482] ? __fget+0x237/0x370 [ 415.848025] ? security_file_ioctl+0x89/0xb0 [ 415.852433] SyS_ioctl+0x8f/0xc0 [ 415.855802] ? do_vfs_ioctl+0x1060/0x1060 [ 415.859963] do_syscall_64+0x1e8/0x640 [ 415.863850] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.868720] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 415.873912] RIP: 0033:0x459829 [ 415.877098] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 415.884812] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 415.892175] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 415.899459] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 16:59:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x4000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)) [ 415.906832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 415.914103] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 415.964874] blk-mq: reduced tag depth (128 -> 64) 16:59:51 executing program 0 (fault-call:10 fault-nth:6): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xbf, "97eb3863d10a895a1c24f3c1ee8af349786c182ac3396777061be640827a385fb8b554963bc9387d5e653d6f250e239cc3b2088038d950d8de09140f3891d05b6e4beb7ab22e63d16af76abc39ac85483dec89a5e8d0b8a50b4f443b0a55b39a9bc1e8a8488442d9f04ff2f39a4bd5072624bb5f85ecb3bd9ab0a9904bba83fa508e34d94be8820c708496f5548aa970358a82160686c9fefec477f84065b41c4ec12d9dfd2284e31f95015af0ab3f169f52d3fee48265251c0c48fa931d93"}, &(0x7f0000000100)=0xe3) getpeername$inet(r1, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10) 16:59:51 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) [ 416.253232] FAULT_INJECTION: forcing a failure. [ 416.253232] name failslab, interval 1, probability 0, space 0, times 0 [ 416.276980] CPU: 0 PID: 18672 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 416.284145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.293527] Call Trace: [ 416.296273] dump_stack+0x138/0x19c [ 416.299902] should_fail.cold+0x10f/0x159 [ 416.304063] should_failslab+0xdb/0x130 [ 416.308028] kmem_cache_alloc_node_trace+0x280/0x770 [ 416.313206] ? __lockdep_init_map+0x10c/0x570 [ 416.317693] sbitmap_queue_init_node+0x294/0x5e0 [ 416.322472] blk_mq_init_tags+0x151/0x290 [ 416.326617] blk_mq_alloc_rq_map+0x97/0x220 [ 416.330927] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 416.335434] blk_mq_alloc_tag_set+0x4a4/0x840 [ 416.339946] loop_add+0x2b9/0x850 [ 416.343405] ? transfer_xor+0x360/0x360 [ 416.347367] ? radix_tree_lookup+0x22/0x30 [ 416.351591] loop_control_ioctl+0x10c/0x2f0 [ 416.355914] ? loop_add+0x850/0x850 [ 416.359542] ? loop_add+0x850/0x850 [ 416.363188] do_vfs_ioctl+0x7ae/0x1060 [ 416.367100] ? selinux_file_mprotect+0x5d0/0x5d0 [ 416.371884] ? lock_downgrade+0x6e0/0x6e0 [ 416.376049] ? ioctl_preallocate+0x1c0/0x1c0 [ 416.380454] ? __fget+0x237/0x370 [ 416.383903] ? security_file_ioctl+0x89/0xb0 [ 416.388304] SyS_ioctl+0x8f/0xc0 [ 416.391668] ? do_vfs_ioctl+0x1060/0x1060 [ 416.395835] do_syscall_64+0x1e8/0x640 [ 416.399725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.404562] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 416.409772] RIP: 0033:0x459829 [ 416.412964] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 416.420776] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 416.428049] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 416.435318] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 416.442590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 416.449852] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 416.466703] blk-mq: reduced tag depth (128 -> 64) 16:59:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 16:59:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:53 executing program 0 (fault-call:10 fault-nth:7): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 16:59:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x12000, 0x0) sendmsg$rds(r2, &(0x7f0000003380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1, &(0x7f0000003100)=[@rdma_args={0x48, 0x114, 0x1, {{0x6, 0x6}, {&(0x7f0000000240)=""/38, 0x26}, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/250, 0xfa}, {&(0x7f0000000380)=""/240, 0xf0}, {&(0x7f0000000480)=""/235, 0xeb}, {&(0x7f0000000580)=""/216, 0xd8}, {&(0x7f0000000680)=""/242, 0xf2}, {&(0x7f0000000780)}], 0x6, 0xb, 0xfffffffffffff824}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000840)=""/97, 0x61}, &(0x7f00000008c0), 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0x5, 0x223c}, {&(0x7f0000000900)=""/40, 0x28}, &(0x7f0000001a00)=[{&(0x7f0000000940)=""/189, 0xbd}, {&(0x7f0000000a00)=""/4096, 0x1000}], 0x2, 0x8, 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0x100, 0x6438}, {&(0x7f0000001a40)=""/102, 0x66}, &(0x7f0000002e80)=[{&(0x7f0000001ac0)=""/153, 0x99}, {&(0x7f0000001b80)=""/82, 0x52}, {&(0x7f0000001c00)=""/219, 0xdb}, {&(0x7f0000001d00)=""/157, 0x9d}, {&(0x7f0000001dc0)=""/182, 0xb6}, {&(0x7f0000001e80)=""/4096, 0x1000}], 0x6, 0x2a, 0x8}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0x400}, &(0x7f0000002f00)=0x9, &(0x7f0000002f40)=0x3, 0xff, 0xde, 0xff, 0x100, 0x49, 0x5}}, @cswp={0x58, 0x114, 0x7, {{0x3, 0x7}, &(0x7f0000002f80)=0x101, &(0x7f0000002fc0)=0xd65, 0x7, 0x1, 0x0, 0x1, 0x22, 0x10001}}, @cswp={0x58, 0x114, 0x7, {{0xfffffffffffffff8, 0x7}, &(0x7f0000003000)=0x4, &(0x7f0000003040)=0x1, 0x5, 0x180000000000, 0x40, 0x81, 0x8, 0xfffffffffffffffb}}, @fadd={0x58, 0x114, 0x6, {{0xb7, 0xf800000000000000}, &(0x7f0000003080)=0x8, &(0x7f00000030c0)=0x4, 0x6, 0x4e3d7b18, 0x80, 0x1f, 0x8, 0x1}}], 0x268, 0x20004081}, 0xc081) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x1) write$P9_RRENAME(r3, &(0x7f0000000080)={0x7, 0x15, 0x2}, 0x7) 16:59:53 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:53 executing program 1: r0 = eventfd(0x3ff) fcntl$setsig(r0, 0xa, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="a6b4928923be23163e058093845697d142db72f1d4a46e533480f6e32660a7786756735f1da5002a6d9952d1496512ee03a269a7be11fcfa39b5d8f221b8723a1eab7fcc4705d76dbc24741d38b1ee7424fa1f75379ddeb5fdca7d3c7fc41152367453bcd6fac446170208b8d9d08dff9461dea0b10bd6b8f5558034bcac94a204a5f8465d62de7715933ef9a899cbc28874633c19a63d0101fb2d62d0df234bd7c2abfb52add64d078b8118446d6ce4353aa49de77e078e55d868ad13415782d5e982bcb55bbde0ae021c8a623b816a4efb59d8e47f92c333d3acaae3ad2086f532a1e45a95f089b4ae259aa78db4", 0xef}, {&(0x7f0000000200)="a9a64a36b5e9c52abdacb8b74b204cbe1193ba03de5ec1dd0c6fb3d699b658a3f1a37919479f1859991e8cce788106412f0a203b29c96501dc5f27ccdfe5c59cbe9a1dcda118149bfe3591e0514a52d4adf302db36f0bb273fcb3c99258b64e1e5e6444e21bdae3f9fac7df167420a60c457f296031b2523d9a0d8427719d36f4ea495b404d9565093d814471c787a479042711c0241742f01057cf9991d47ed76b1ec69b223b220e8f193435ab36b", 0xaf}], 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) sched_setparam(r2, &(0x7f0000000080)=0x8) 16:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 418.781418] FAULT_INJECTION: forcing a failure. [ 418.781418] name failslab, interval 1, probability 0, space 0, times 0 [ 418.847419] CPU: 1 PID: 18695 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 418.854584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.863927] Call Trace: [ 418.866528] dump_stack+0x138/0x19c [ 418.870172] should_fail.cold+0x10f/0x159 [ 418.874321] should_failslab+0xdb/0x130 [ 418.878379] kmem_cache_alloc_node_trace+0x280/0x770 [ 418.883476] ? retint_kernel+0x2d/0x2d [ 418.887367] __kmalloc_node+0x3d/0x80 [ 418.891255] blk_mq_alloc_rq_map+0xc8/0x220 [ 418.895595] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 418.900109] blk_mq_alloc_tag_set+0x4a4/0x840 [ 418.904607] loop_add+0x2b9/0x850 [ 418.908054] ? transfer_xor+0x360/0x360 [ 418.912020] ? radix_tree_lookup+0x22/0x30 [ 418.916346] loop_control_ioctl+0x10c/0x2f0 [ 418.920674] ? loop_add+0x850/0x850 [ 418.924311] ? loop_add+0x850/0x850 [ 418.927931] do_vfs_ioctl+0x7ae/0x1060 [ 418.931815] ? selinux_file_mprotect+0x5d0/0x5d0 [ 418.936569] ? lock_downgrade+0x6e0/0x6e0 [ 418.940713] ? ioctl_preallocate+0x1c0/0x1c0 [ 418.945118] ? __fget+0x237/0x370 [ 418.948570] ? security_file_ioctl+0x89/0xb0 [ 418.952992] SyS_ioctl+0x8f/0xc0 [ 418.956351] ? do_vfs_ioctl+0x1060/0x1060 [ 418.960493] do_syscall_64+0x1e8/0x640 [ 418.964376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.969225] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 418.974418] RIP: 0033:0x459829 [ 418.977610] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.985312] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 16:59:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 418.992612] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 418.999884] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 419.007146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 419.014415] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 419.030759] blk-mq: reduced tag depth (128 -> 64) 16:59:54 executing program 0 (fault-call:10 fault-nth:8): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:54 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:54 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e22, 0xb6, @rand_addr="7152a8165e282664aaacff3e8fb7443b", 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, @in6={0xa, 0x4e21, 0x1, @loopback, 0x4}], 0x68) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 16:59:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 419.322728] FAULT_INJECTION: forcing a failure. [ 419.322728] name failslab, interval 1, probability 0, space 0, times 0 [ 419.364254] CPU: 0 PID: 18729 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 419.371617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.380978] Call Trace: [ 419.383572] dump_stack+0x138/0x19c [ 419.387203] should_fail.cold+0x10f/0x159 [ 419.391362] should_failslab+0xdb/0x130 [ 419.395339] kmem_cache_alloc_node_trace+0x280/0x770 [ 419.400623] ? kasan_unpoison_shadow+0x35/0x50 [ 419.405221] __kmalloc_node+0x3d/0x80 [ 419.409038] blk_mq_alloc_rq_map+0x109/0x220 [ 419.413464] __blk_mq_alloc_rq_map+0xb1/0x2d0 [ 419.417975] blk_mq_alloc_tag_set+0x4a4/0x840 [ 419.422478] loop_add+0x2b9/0x850 [ 419.425942] ? transfer_xor+0x360/0x360 [ 419.429928] ? radix_tree_lookup+0x22/0x30 [ 419.434165] loop_control_ioctl+0x10c/0x2f0 [ 419.438496] ? loop_add+0x850/0x850 [ 419.442119] ? do_vfs_ioctl+0x713/0x1060 [ 419.446175] ? loop_add+0x850/0x850 [ 419.449802] do_vfs_ioctl+0x7ae/0x1060 [ 419.453715] ? selinux_file_mprotect+0x5d0/0x5d0 [ 419.458499] ? ioctl_preallocate+0x1c0/0x1c0 [ 419.462902] ? __fget+0x237/0x370 [ 419.466444] ? security_file_ioctl+0x89/0xb0 [ 419.470862] SyS_ioctl+0x8f/0xc0 [ 419.474242] ? do_vfs_ioctl+0x1060/0x1060 [ 419.478389] do_syscall_64+0x1e8/0x640 [ 419.482271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.487113] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 419.492299] RIP: 0033:0x459829 [ 419.495483] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 419.503189] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 419.510459] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 419.517726] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 419.524994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 419.532266] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 419.545358] blk-mq: reduced tag depth (128 -> 64) 16:59:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bcff6efee3b5cf0f191b8f07892e11360800"}) 16:59:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674", 0x13}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0x959, 0x3, 0x0, 0x0, @adapter={0x7fffffff, 0xa58e, 0x3f, 0xe5cf, 0x1f}}]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 16:59:56 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) 16:59:56 executing program 0 (fault-call:10 fault-nth:9): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674", 0x13}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:56 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x4000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='oUUU\x00\x00\x00\x00']) [ 421.787660] FAULT_INJECTION: forcing a failure. [ 421.787660] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 421.823663] CPU: 0 PID: 18758 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 421.830809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.840161] Call Trace: [ 421.842741] dump_stack+0x138/0x19c [ 421.846387] should_fail.cold+0x10f/0x159 [ 421.850644] ? __might_sleep+0x93/0xb0 [ 421.854517] __alloc_pages_nodemask+0x1d6/0x7a0 [ 421.859172] ? __alloc_pages_slowpath+0x2930/0x2930 [ 421.864182] ? blk_mq_alloc_rqs+0x5a/0x6d0 [ 421.868402] blk_mq_alloc_rqs+0x1fb/0x6d0 [ 421.872558] __blk_mq_alloc_rq_map+0x15f/0x2d0 [ 421.877150] blk_mq_alloc_tag_set+0x4a4/0x840 [ 421.881633] loop_add+0x2b9/0x850 [ 421.885082] ? transfer_xor+0x360/0x360 [ 421.889040] ? radix_tree_lookup+0x22/0x30 [ 421.893366] loop_control_ioctl+0x10c/0x2f0 [ 421.897672] ? loop_add+0x850/0x850 [ 421.901292] ? loop_add+0x850/0x850 [ 421.904934] do_vfs_ioctl+0x7ae/0x1060 [ 421.908805] ? selinux_file_mprotect+0x5d0/0x5d0 [ 421.913542] ? check_preemption_disabled+0x3c/0x250 [ 421.918566] ? ioctl_preallocate+0x1c0/0x1c0 [ 421.922963] ? security_file_ioctl+0x89/0xb0 [ 421.927355] SyS_ioctl+0x8f/0xc0 [ 421.930703] ? do_vfs_ioctl+0x1060/0x1060 [ 421.934835] do_syscall_64+0x1e8/0x640 [ 421.938703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.943533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.948721] RIP: 0033:0x459829 [ 421.951895] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.959588] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 421.966856] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 421.974127] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 421.981378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 16:59:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674", 0x13}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000080)={0x1000, 0x4, 0x7, 0x8, 0x1}) [ 421.988627] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:57 executing program 0 (fault-call:10 fault-nth:10): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fa", 0x1d}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 16:59:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)) [ 422.334733] FAULT_INJECTION: forcing a failure. [ 422.334733] name failslab, interval 1, probability 0, space 0, times 0 [ 422.348294] CPU: 0 PID: 18790 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 422.355438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.364821] Call Trace: [ 422.367423] dump_stack+0x138/0x19c [ 422.371166] should_fail.cold+0x10f/0x159 [ 422.375417] ? should_failslab+0x12/0x130 [ 422.379594] should_failslab+0xdb/0x130 [ 422.383668] kmem_cache_alloc_node+0x287/0x780 [ 422.388264] ? lockdep_init_map+0x9/0x10 [ 422.393124] ? debug_mutex_init+0x2d/0x5a [ 422.397313] blk_alloc_queue_node+0x32/0xac0 [ 422.402008] blk_mq_init_queue+0x4a/0xa0 [ 422.406866] loop_add+0x31c/0x850 [ 422.410441] ? transfer_xor+0x360/0x360 [ 422.414593] ? radix_tree_lookup+0x22/0x30 [ 422.419983] loop_control_ioctl+0x10c/0x2f0 [ 422.428527] ? loop_add+0x850/0x850 [ 422.434560] ? loop_add+0x850/0x850 [ 422.439999] do_vfs_ioctl+0x7ae/0x1060 [ 422.444886] ? selinux_file_mprotect+0x5d0/0x5d0 [ 422.450363] ? lock_downgrade+0x6e0/0x6e0 [ 422.455551] ? ioctl_preallocate+0x1c0/0x1c0 [ 422.461298] ? __fget+0x237/0x370 [ 422.465089] ? security_file_ioctl+0x89/0xb0 [ 422.469872] SyS_ioctl+0x8f/0xc0 [ 422.473543] ? do_vfs_ioctl+0x1060/0x1060 [ 422.479037] do_syscall_64+0x1e8/0x640 [ 422.482927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.487782] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 422.492971] RIP: 0033:0x459829 [ 422.496153] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.503870] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 422.511145] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 422.518424] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 422.525706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 422.532971] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 16:59:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fa", 0x1d}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000000000100000000000000000000000000000000000000000000000000000000001300"/56]) r2 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 16:59:59 executing program 0 (fault-call:10 fault-nth:11): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 16:59:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') 16:59:59 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x800) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) kcmp(r0, r1, 0x6, r2, r3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) 16:59:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fa", 0x1d}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 16:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 16:59:59 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$NBD_CLEAR_QUE(r0, 0xab05) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x401, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="6e555555f7ff0000"]) [ 424.831400] FAULT_INJECTION: forcing a failure. [ 424.831400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 424.843326] CPU: 1 PID: 18813 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 424.843335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.843340] Call Trace: [ 424.843359] dump_stack+0x138/0x19c [ 424.843384] should_fail.cold+0x10f/0x159 [ 424.859837] __alloc_pages_nodemask+0x1d6/0x7a0 [ 424.859855] ? __alloc_pages_slowpath+0x2930/0x2930 [ 424.859879] cache_grow_begin+0x80/0x400 [ 424.859893] kmem_cache_alloc_node+0x6a4/0x780 [ 424.874904] ? lockdep_init_map+0x9/0x10 [ 424.874915] ? debug_mutex_init+0x2d/0x5a [ 424.874933] blk_alloc_queue_node+0x32/0xac0 [ 424.874949] blk_mq_init_queue+0x4a/0xa0 [ 424.874961] loop_add+0x31c/0x850 [ 424.874973] ? transfer_xor+0x360/0x360 [ 424.884068] ? radix_tree_lookup+0x22/0x30 [ 424.884083] loop_control_ioctl+0x10c/0x2f0 [ 424.884094] ? loop_add+0x850/0x850 [ 424.925158] ? loop_add+0x850/0x850 [ 424.928777] do_vfs_ioctl+0x7ae/0x1060 [ 424.932660] ? selinux_file_mprotect+0x5d0/0x5d0 [ 424.937412] ? lock_downgrade+0x6e0/0x6e0 [ 424.941558] ? ioctl_preallocate+0x1c0/0x1c0 [ 424.945988] ? __fget+0x237/0x370 [ 424.949470] ? security_file_ioctl+0x89/0xb0 [ 424.953978] SyS_ioctl+0x8f/0xc0 [ 424.957362] ? do_vfs_ioctl+0x1060/0x1060 [ 424.961523] do_syscall_64+0x1e8/0x640 [ 424.965980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.971060] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 424.976256] RIP: 0033:0x459829 [ 424.979793] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.987613] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 424.994998] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 425.005140] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 425.014722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 425.023815] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b9", 0x22}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x24080, 0x0) 17:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:00 executing program 0 (fault-call:10 fault-nth:12): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b9", 0x22}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x111040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='nU?U\x00\x00\x00\x00']) [ 425.413609] FAULT_INJECTION: forcing a failure. [ 425.413609] name failslab, interval 1, probability 0, space 0, times 0 [ 425.426660] CPU: 1 PID: 18849 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 425.433781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.433787] Call Trace: [ 425.433807] dump_stack+0x138/0x19c [ 425.433832] should_fail.cold+0x10f/0x159 [ 425.433850] should_failslab+0xdb/0x130 [ 425.433866] kmem_cache_alloc_node_trace+0x280/0x770 [ 425.433880] ? check_preemption_disabled+0x3c/0x250 [ 425.433890] ? retint_kernel+0x2d/0x2d [ 425.433902] ? mempool_free+0x1d0/0x1d0 [ 425.433914] mempool_create_node+0x75/0x3d0 [ 425.433925] ? mempool_kmalloc+0x30/0x30 [ 425.433936] ? mempool_kmalloc+0x30/0x30 [ 425.433947] ? mempool_free+0x1d0/0x1d0 [ 425.433961] ? mempool_kmalloc+0x30/0x30 [ 425.449547] mempool_create+0x3a/0x50 [ 425.462756] bioset_create+0x387/0x760 [ 425.462773] blk_alloc_queue_node+0xab/0xac0 [ 425.462789] blk_mq_init_queue+0x4a/0xa0 [ 425.472894] loop_add+0x31c/0x850 [ 425.472905] ? transfer_xor+0x360/0x360 [ 425.472917] ? radix_tree_lookup+0x22/0x30 [ 425.472929] loop_control_ioctl+0x10c/0x2f0 [ 425.472938] ? loop_add+0x850/0x850 [ 425.472951] ? do_vfs_ioctl+0x74f/0x1060 [ 425.538211] ? loop_add+0x850/0x850 [ 425.541845] do_vfs_ioctl+0x7ae/0x1060 [ 425.545729] ? selinux_file_mprotect+0x5d0/0x5d0 [ 425.550479] ? lock_downgrade+0x6e0/0x6e0 [ 425.554619] ? ioctl_preallocate+0x1c0/0x1c0 [ 425.559020] ? __fget+0x237/0x370 [ 425.562479] ? security_file_ioctl+0x89/0xb0 [ 425.566905] SyS_ioctl+0x8f/0xc0 [ 425.570283] ? do_vfs_ioctl+0x1060/0x1060 [ 425.574427] do_syscall_64+0x1e8/0x640 [ 425.578323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.583167] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 425.588373] RIP: 0033:0x459829 [ 425.591973] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.599704] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 425.606967] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 425.614235] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 425.621499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 425.628766] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b9", 0x22}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x38000000000000, 0x7, 0x8, 0x20}]}, 0x10) connect$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0x100000000, 0x23, 0xef, 0x6, 0xfffffffffffffffc, 0x40}, 0xf2}, 0xa) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x440) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x3, 0xc, 0x0, 0x3, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x5, @rand_addr="7f9222ceaf982b36c817e81069737485", 0x3}}, 0x24) 17:00:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x100000000, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000600)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="6e36085500000000e4a5728ab82f3facf75d176c3a9711be4096a7383edde72a8bdffe448163782591d75b6d225b908f40436c7a4ca2764266c57bc9497da7b5fb151635350dc16cb650fc791e3a19b5d69058f072e97000"/103]) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180), 0x0, 0x6}, {&(0x7f0000000240)="539db0060174b271e2f7a60b3a0c1a87499e55f9be4a696798a78fe73efa7b66ff0bf91c3bea3f9968ed94d2a7c1a252146a2b5c741296649353416c327241875f2531252bbfaff5f4f9f8c455bf2a8070e0e5829539e97b1db0d39d58c406c9ecc057b94f49808110758d6f5dd6d4c6f80dc58a7f07fac4bb735217042244ebd4fe4eb3fa9342e507c597f0caff7d4ef596ad8cedd4b7c91db1abb5", 0x9c, 0x44a3}, {&(0x7f0000000300)="475078d6b6655ae2bf54233920c0676cf1e6b7d4062da87489a34868ce48b1bc83077a003726254b0ca914331cdf896b4b71effd224e3029660463515ae6ecdb5b7a5505552676b4bfdb08b27ab66fcb", 0x50, 0x80}, {&(0x7f00000001c0)="ddbf78f31311134c84b7a75a4523fd488c659974efbcf280b00ec1ca7cbba350cbaad6c523967d6e", 0x28, 0x6}, {&(0x7f0000000380)="801acfaad238f824f61210b1f125819562fbc3038da056812c9d7ef783a186b2419e3ffc8f77b1206e84bdef8b5ac6681f68db033d3bbfcefb727e8f25c39a1aea6ff134040cf2fb451e7b62612af0d499a41aa1a6d310adf6d2997f185bc18a6a1e6168a146f346a70010499e3510f4102dff9f67a68a8951dffa79426a57b14be7a53707dcd5b68ed5e17b9e0f3ca14ca9b8a5801c2a17c2e58ab2708b0f", 0x9f, 0x1}, {&(0x7f0000000440)="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", 0xff, 0x8}], 0x14400, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000640)={@rand_addr="72fa819fa8620afb8a2d4d98d9f73d1f", 0xd, 0x100000000000012, 0x0, 0x4000000000d, 0xd62, 0x8}, &(0x7f0000000680)=0x3d7164e4) 17:00:02 executing program 0 (fault-call:10 fault-nth:13): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e", 0x24}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 427.807069] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 17:00:03 executing program 1: syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xff, 0x8640) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x8, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0xe00, 0x3f, 0x0, 0xfffffffffffffffa, 0x8, 0x81, 0x1000, 0x5, 0x0, 0x8, 0x6, 0x4, 0x401}, {0x800, 0x2a, 0x9, 0x9, 0x1, 0x7fff, 0x6, 0x0, 0x1, 0x100, 0xfffffffffffffc01, 0x0, 0xffff}, {0x3, 0x4d, 0x7, 0x1f, 0xa8f, 0x9, 0x9, 0x3, 0xffffffff80000001, 0x9, 0x3, 0x4, 0x9}], 0x100000001}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000680)=""/216) [ 427.946064] FAULT_INJECTION: forcing a failure. [ 427.946064] name failslab, interval 1, probability 0, space 0, times 0 [ 427.969394] CPU: 0 PID: 18873 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 427.976531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.985980] Call Trace: [ 427.988573] dump_stack+0x138/0x19c [ 427.992378] should_fail.cold+0x10f/0x159 [ 427.996522] should_failslab+0xdb/0x130 [ 428.000495] kmem_cache_alloc_node_trace+0x280/0x770 [ 428.005612] ? rcu_read_lock_sched_held+0x110/0x130 [ 428.010626] ? kmem_cache_alloc_node_trace+0x379/0x770 [ 428.015897] ? lock_downgrade+0x6e0/0x6e0 [ 428.020044] ? mempool_free+0x1d0/0x1d0 [ 428.024013] __kmalloc_node+0x3d/0x80 [ 428.027821] mempool_create_node+0xb7/0x3d0 [ 428.032156] ? mempool_kmalloc+0x30/0x30 [ 428.036215] ? mempool_free+0x1d0/0x1d0 [ 428.040200] ? mempool_kmalloc+0x30/0x30 [ 428.044258] mempool_create+0x3a/0x50 [ 428.048055] bioset_create+0x387/0x760 [ 428.051939] blk_alloc_queue_node+0xab/0xac0 [ 428.056354] blk_mq_init_queue+0x4a/0xa0 [ 428.060426] loop_add+0x31c/0x850 [ 428.063879] ? transfer_xor+0x360/0x360 [ 428.067850] ? radix_tree_lookup+0x22/0x30 [ 428.072113] loop_control_ioctl+0x10c/0x2f0 [ 428.076430] ? loop_add+0x850/0x850 [ 428.080067] ? loop_add+0x850/0x850 [ 428.083686] do_vfs_ioctl+0x7ae/0x1060 [ 428.087567] ? selinux_file_mprotect+0x5d0/0x5d0 [ 428.092317] ? lock_downgrade+0x6e0/0x6e0 [ 428.096472] ? ioctl_preallocate+0x1c0/0x1c0 [ 428.100886] ? __fget+0x237/0x370 [ 428.104346] ? security_file_ioctl+0x89/0xb0 [ 428.108839] SyS_ioctl+0x8f/0xc0 [ 428.112209] ? do_vfs_ioctl+0x1060/0x1060 [ 428.116357] do_syscall_64+0x1e8/0x640 [ 428.120244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.125097] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.130280] RIP: 0033:0x459829 [ 428.133461] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:00:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e", 0x24}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 428.141161] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 428.148597] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 428.155861] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.163126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 428.170391] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:03 executing program 0 (fault-call:10 fault-nth:14): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:03 executing program 1: prctl$PR_SET_FPEXC(0xc, 0x80) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "53c1725ce052a2a21d40dba90e26bc336efee3b5cf0d191b8f07892e113600"}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x18) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) 17:00:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = shmget(0x1, 0x7000, 0x10, &(0x7f0000ff7000/0x7000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000040)=""/83) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e", 0x24}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="53555555000000006360c39a1b9f760ab3829e593aea72154221e4142b6720a4772a08c36971459721edd47168dc99c20909fcdf0716dc12fb6ded1f63f7d952284b121ff6e792e7dad15a7922a920371a88c51eadd138e5b20350804f735b10f73ee179e9ef4f103f5595254b3afed1c83783ef42e13550e8897a6c28c16e83861c352c7dcf4d432573be52a57e7fa0c2555b44bc376f89e3296784c999c1b91da2b4783eb714b5d7611bd62e7b8c60f89a6e3c51f99cb132b805b1"]) r2 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f0000000140)=0x80, 0x800) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000180), 0x4) [ 428.526638] FAULT_INJECTION: forcing a failure. [ 428.526638] name failslab, interval 1, probability 0, space 0, times 0 [ 428.572973] CPU: 1 PID: 18907 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 428.580127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.590111] Call Trace: [ 428.592796] dump_stack+0x138/0x19c [ 428.596427] should_fail.cold+0x10f/0x159 [ 428.600572] should_failslab+0xdb/0x130 [ 428.604548] kmem_cache_alloc+0x2d7/0x780 [ 428.608711] ? mempool_free+0x1d0/0x1d0 [ 428.612684] ? mempool_free+0x1d0/0x1d0 [ 428.616674] mempool_alloc_slab+0x47/0x60 [ 428.620818] mempool_create_node+0x2d6/0x3d0 [ 428.625224] ? mempool_free+0x1d0/0x1d0 [ 428.629193] ? mempool_kmalloc+0x30/0x30 [ 428.633258] mempool_create+0x3a/0x50 [ 428.637152] bioset_create+0x387/0x760 [ 428.641052] blk_alloc_queue_node+0xab/0xac0 [ 428.645464] blk_mq_init_queue+0x4a/0xa0 [ 428.649549] loop_add+0x31c/0x850 [ 428.653014] ? transfer_xor+0x360/0x360 [ 428.656987] ? radix_tree_lookup+0x22/0x30 [ 428.661266] loop_control_ioctl+0x10c/0x2f0 [ 428.665596] ? loop_add+0x850/0x850 [ 428.669229] ? loop_add+0x850/0x850 [ 428.672872] do_vfs_ioctl+0x7ae/0x1060 [ 428.676782] ? selinux_file_mprotect+0x5d0/0x5d0 [ 428.681551] ? lock_downgrade+0x6e0/0x6e0 [ 428.685715] ? ioctl_preallocate+0x1c0/0x1c0 [ 428.690190] ? __fget+0x237/0x370 [ 428.693656] ? security_file_ioctl+0x89/0xb0 [ 428.698096] SyS_ioctl+0x8f/0xc0 [ 428.701467] ? do_vfs_ioctl+0x1060/0x1060 [ 428.705648] do_syscall_64+0x1e8/0x640 [ 428.709549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.714418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.719625] RIP: 0033:0x459829 [ 428.722811] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.730548] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 428.737828] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 428.745112] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.752392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 428.759678] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:05 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$rds(r0, &(0x7f0000000140)={0x2, 0x0, @empty}, 0x10) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x2, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f00"}) r2 = getpgid(0xffffffffffffffff) sched_getattr(r2, &(0x7f0000000000)={0x30}, 0x30, 0x0) 17:00:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='environ\x00') 17:00:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e32", 0x25}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:05 executing program 0 (fault-call:10 fault-nth:15): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) 17:00:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e32", 0x25}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000080)={0x4002, 0x100000000, 0x3, 0x7}) [ 430.963025] FAULT_INJECTION: forcing a failure. [ 430.963025] name failslab, interval 1, probability 0, space 0, times 0 [ 430.989550] CPU: 0 PID: 18934 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 430.996703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.006077] Call Trace: [ 431.008703] dump_stack+0x138/0x19c [ 431.012423] should_fail.cold+0x10f/0x159 [ 431.016575] should_failslab+0xdb/0x130 [ 431.020545] kmem_cache_alloc+0x2d7/0x780 [ 431.024831] ? __phys_addr+0x78/0xe0 [ 431.028537] ? kasan_poison_slab_free.isra.0+0x44/0x50 [ 431.033820] ? mempool_free+0x1d0/0x1d0 [ 431.037788] mempool_alloc_slab+0x47/0x60 [ 431.041934] mempool_create_node+0x2d6/0x3d0 [ 431.046357] ? mempool_free+0x1d0/0x1d0 [ 431.050333] ? mempool_kmalloc+0x30/0x30 [ 431.054400] mempool_create+0x3a/0x50 [ 431.058200] bioset_create+0x387/0x760 [ 431.062109] blk_alloc_queue_node+0xab/0xac0 [ 431.066559] blk_mq_init_queue+0x4a/0xa0 [ 431.070648] loop_add+0x31c/0x850 [ 431.074102] ? transfer_xor+0x360/0x360 [ 431.078074] ? radix_tree_lookup+0x22/0x30 [ 431.082307] loop_control_ioctl+0x10c/0x2f0 [ 431.086645] ? loop_add+0x850/0x850 [ 431.090279] ? loop_add+0x850/0x850 [ 431.093907] do_vfs_ioctl+0x7ae/0x1060 [ 431.097803] ? selinux_file_mprotect+0x5d0/0x5d0 [ 431.102566] ? lock_downgrade+0x6e0/0x6e0 [ 431.106726] ? ioctl_preallocate+0x1c0/0x1c0 [ 431.111148] ? __fget+0x237/0x370 [ 431.114615] ? security_file_ioctl+0x89/0xb0 [ 431.119039] SyS_ioctl+0x8f/0xc0 [ 431.122420] ? do_vfs_ioctl+0x1060/0x1060 [ 431.126576] do_syscall_64+0x1e8/0x640 [ 431.130472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.135343] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.140554] RIP: 0033:0x459829 [ 431.143753] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.151471] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 17:00:06 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000080)={0x1, "70c601441660655274ef982e6d1e7ae5fb5ed747c3128a185a41afa06dbed587", 0x2, 0x5, 0x3, 0x0, 0x20000, 0xc}) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 431.158744] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 431.166016] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 431.173369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 431.180751] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000001c0)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532342c73713d3078303030303030303030303030303766662c61756469742c6d61736b3d4d41595f524541442c6f626a5f75737f723d2c657569643c", @ANYRESDEC=r1, @ANYBLOB="2c736d61636b66736465663d766d683ff8659f82a76e636f6e66696e65645f752c617569643ddd759767986a96d4b85a8a26f135e21945fba325bbce01fba1774bdf7df3c89ea632ef1c0b1a76aa3355483baf7364ed05a90281ca2a26dc36d9f8f3e2246e4c57568acb0d33cac60a4f0a5745745a68ebb46f2f5c628473938c3f99d7cadc781236e9fb90c35811cd6f6a18da031e70ce5660697c38e4485d52b4af09bd36347bc81b9c6e31cbd0b00c0be08d078890e29b7dd864a5426cd5d6bd284600145978d3b727324a9285374629cb0fb557d73d4f0502bed849320000000000", @ANYRESDEC=r2, @ANYBLOB=',appraise,subj_user=$cgroupppp1,\x00']) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000340)={0x1, 0x0, [{0x3, 0x0, 0x0, 0x0, @msi={0x3, 0x100000000, 0x7}}]}) 17:00:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e32", 0x25}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:06 executing program 0 (fault-call:10 fault-nth:16): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:06 executing program 4: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="547b021755860b673c5bbd39b4372e6efc5e32e1a3de2c6416f87ae067d30c07a17ee7ba96800288f80d08737f431c09ba93a88468be6682cbbb2533e6b55da2751e36e65c6d30051d09e2140b40a67503c5e2e24ea0db496970e27b03f6a8429d69f000d4c94999f2441e4166b9381a6b0a2351c7c8f691dc72307bde1ad015aaba13680bac8f4b4fde2d85c056a566ef3ffbd67c04f5b10e415e4877624b49b8fb0214b52c9a11df1113ff5ea7e5ed86a907d197cae7c0b1acf6801b510ae4d91b8b88e845e03f6ffefe876625c7aed95f2d66ba2ee61a465b0cdbf2d97119259a33"]) [ 431.560711] FAULT_INJECTION: forcing a failure. [ 431.560711] name failslab, interval 1, probability 0, space 0, times 0 [ 431.587794] CPU: 0 PID: 18973 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 431.594965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.604420] Call Trace: [ 431.604444] dump_stack+0x138/0x19c [ 431.604475] should_fail.cold+0x10f/0x159 [ 431.610710] should_failslab+0xdb/0x130 [ 431.610725] kmem_cache_alloc+0x2d7/0x780 [ 431.610737] ? __lockdep_init_map+0x10c/0x570 [ 431.610750] ? mempool_free+0x1d0/0x1d0 [ 431.610761] mempool_alloc_slab+0x47/0x60 [ 431.610772] mempool_create_node+0x2d6/0x3d0 [ 431.610790] ? mempool_free+0x1d0/0x1d0 [ 431.627628] ? mempool_kmalloc+0x30/0x30 [ 431.627641] mempool_create+0x3a/0x50 [ 431.627660] bioset_create+0x387/0x760 [ 431.635801] blk_alloc_queue_node+0xab/0xac0 [ 431.635817] blk_mq_init_queue+0x4a/0xa0 [ 431.635832] loop_add+0x31c/0x850 [ 431.635844] ? transfer_xor+0x360/0x360 [ 431.635858] ? radix_tree_lookup+0x22/0x30 [ 431.676225] loop_control_ioctl+0x10c/0x2f0 [ 431.680572] ? loop_add+0x850/0x850 [ 431.684215] ? loop_add+0x850/0x850 [ 431.687871] do_vfs_ioctl+0x7ae/0x1060 [ 431.692835] ? selinux_file_mprotect+0x5d0/0x5d0 [ 431.697598] ? lock_downgrade+0x6e0/0x6e0 [ 431.701754] ? ioctl_preallocate+0x1c0/0x1c0 [ 431.706172] ? __fget+0x237/0x370 [ 431.709631] ? security_file_ioctl+0x89/0xb0 [ 431.714050] SyS_ioctl+0x8f/0xc0 [ 431.717417] ? do_vfs_ioctl+0x1060/0x1060 [ 431.721569] do_syscall_64+0x1e8/0x640 [ 431.725453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.730304] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.735499] RIP: 0033:0x459829 [ 431.738700] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.746431] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 431.753710] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 431.761157] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 431.768441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 431.775726] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) dup2(r1, r1) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000002000000"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x7, 0x4) 17:00:08 executing program 0 (fault-call:10 fault-nth:17): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:08 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) 17:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x4000000000003) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 434.027493] FAULT_INJECTION: forcing a failure. [ 434.027493] name failslab, interval 1, probability 0, space 0, times 0 [ 434.080107] CPU: 1 PID: 18997 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 434.087284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.096650] Call Trace: [ 434.099267] dump_stack+0x138/0x19c [ 434.102930] should_fail.cold+0x10f/0x159 [ 434.107084] should_failslab+0xdb/0x130 [ 434.111068] kmem_cache_alloc_node_trace+0x280/0x770 [ 434.116190] ? rcu_read_lock_sched_held+0x110/0x130 [ 434.121221] ? kmem_cache_alloc_node_trace+0x379/0x770 [ 434.126611] ? mempool_free+0x1d0/0x1d0 [ 434.130585] __kmalloc_node+0x3d/0x80 [ 434.134823] mempool_create_node+0xb7/0x3d0 [ 434.139203] ? mempool_kmalloc+0x30/0x30 [ 434.143266] ? mempool_free+0x1d0/0x1d0 [ 434.147320] ? mempool_kmalloc+0x30/0x30 [ 434.151396] mempool_create+0x3a/0x50 [ 434.155204] bioset_create+0x55e/0x760 [ 434.159093] blk_alloc_queue_node+0xab/0xac0 [ 434.164035] blk_mq_init_queue+0x4a/0xa0 [ 434.168102] loop_add+0x31c/0x850 [ 434.171556] ? transfer_xor+0x360/0x360 [ 434.175544] ? radix_tree_lookup+0x22/0x30 [ 434.180399] loop_control_ioctl+0x10c/0x2f0 [ 434.185533] ? loop_add+0x850/0x850 [ 434.189162] ? loop_add+0x850/0x850 [ 434.192980] do_vfs_ioctl+0x7ae/0x1060 [ 434.196901] ? selinux_file_mprotect+0x5d0/0x5d0 [ 434.203120] ? lock_downgrade+0x6e0/0x6e0 [ 434.207574] ? ioctl_preallocate+0x1c0/0x1c0 [ 434.212844] ? __fget+0x237/0x370 [ 434.216315] ? security_file_ioctl+0x89/0xb0 [ 434.220725] SyS_ioctl+0x8f/0xc0 [ 434.224089] ? do_vfs_ioctl+0x1060/0x1060 [ 434.228257] do_syscall_64+0x1e8/0x640 [ 434.232163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.237106] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 434.242294] RIP: 0033:0x459829 [ 434.245486] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.253458] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 434.260818] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 434.268170] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10040011}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x8c, r3, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @broadcast}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffd}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x81) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x2, 0x3e, 0x8, 0x0, 0x0, 0x8, 0x40020, 0xe, 0x7eca, 0x3, 0x9, 0x1ff, 0x2, 0x6, 0x2, 0x9, 0x0, 0x1, 0x7f, 0x8, 0x1f, 0x1, 0x0, 0x80000000, 0x3f8000, 0x8, 0x8, 0xffff, 0xffffffff00000000, 0x60, 0x3f, 0xe96b, 0x5, 0x80000001, 0x9, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1f, 0x6}, 0x0, 0x6, 0x394a, 0x5, 0x1ff, 0x9, 0x8}) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x3, 0x8, 0x4, 0x4, 0x7}) [ 434.275544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 434.283188] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:09 executing program 0 (fault-call:10 fault-nth:18): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='nUUU\x00\x00\x00e']) 17:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 434.685416] FAULT_INJECTION: forcing a failure. [ 434.685416] name failslab, interval 1, probability 0, space 0, times 0 [ 434.699641] CPU: 1 PID: 19040 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 434.707238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.707245] Call Trace: [ 434.707266] dump_stack+0x138/0x19c [ 434.707288] should_fail.cold+0x10f/0x159 [ 434.726976] should_failslab+0xdb/0x130 [ 434.726990] kmem_cache_alloc+0x2d7/0x780 [ 434.726999] ? kasan_unpoison_shadow+0x35/0x50 [ 434.727012] ? __lockdep_init_map+0x10c/0x570 [ 434.735142] ? mempool_free+0x1d0/0x1d0 [ 434.735155] mempool_alloc_slab+0x47/0x60 [ 434.735166] mempool_create_node+0x2d6/0x3d0 [ 434.756769] ? mempool_free+0x1d0/0x1d0 [ 434.760759] ? mempool_kmalloc+0x30/0x30 [ 434.764825] mempool_create+0x3a/0x50 [ 434.768637] bioset_create+0x55e/0x760 [ 434.772538] blk_alloc_queue_node+0xab/0xac0 [ 434.776960] blk_mq_init_queue+0x4a/0xa0 [ 434.781031] loop_add+0x31c/0x850 [ 434.784480] ? transfer_xor+0x360/0x360 [ 434.788444] ? radix_tree_lookup+0x22/0x30 [ 434.792687] loop_control_ioctl+0x10c/0x2f0 [ 434.796993] ? loop_add+0x850/0x850 [ 434.800613] ? loop_add+0x850/0x850 [ 434.804231] do_vfs_ioctl+0x7ae/0x1060 [ 434.808241] ? selinux_file_mprotect+0x5d0/0x5d0 [ 434.812994] ? lock_downgrade+0x6e0/0x6e0 [ 434.817159] ? ioctl_preallocate+0x1c0/0x1c0 [ 434.821565] ? __fget+0x237/0x370 [ 434.825017] ? security_file_ioctl+0x89/0xb0 [ 434.829406] SyS_ioctl+0x8f/0xc0 [ 434.832764] ? do_vfs_ioctl+0x1060/0x1060 [ 434.836911] do_syscall_64+0x1e8/0x640 [ 434.840789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.845626] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 434.850807] RIP: 0033:0x459829 [ 434.853990] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.861686] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 434.868948] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 434.876198] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 434.883478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 434.890766] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) 17:00:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) 17:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x400000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:12 executing program 0 (fault-call:10 fault-nth:19): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x1) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000040)={'gre0\x00', 0x10000}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 437.056859] FAULT_INJECTION: forcing a failure. [ 437.056859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.068710] CPU: 1 PID: 19063 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 437.068720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.068724] Call Trace: [ 437.068750] dump_stack+0x138/0x19c [ 437.068776] should_fail.cold+0x10f/0x159 [ 437.091413] __alloc_pages_nodemask+0x1d6/0x7a0 [ 437.091430] ? __alloc_pages_slowpath+0x2930/0x2930 [ 437.091455] cache_grow_begin+0x80/0x400 [ 437.091469] kmem_cache_alloc+0x6a6/0x780 [ 437.091477] ? kasan_unpoison_shadow+0x35/0x50 [ 437.091490] ? __lockdep_init_map+0x10c/0x570 [ 437.100338] ? mempool_free+0x1d0/0x1d0 [ 437.100352] mempool_alloc_slab+0x47/0x60 [ 437.100364] mempool_create_node+0x2d6/0x3d0 [ 437.100377] ? mempool_free+0x1d0/0x1d0 [ 437.100386] ? mempool_kmalloc+0x30/0x30 [ 437.100395] mempool_create+0x3a/0x50 [ 437.100409] bioset_create+0x55e/0x760 [ 437.100431] blk_alloc_queue_node+0xab/0xac0 17:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) [ 437.109503] blk_mq_init_queue+0x4a/0xa0 [ 437.109517] loop_add+0x31c/0x850 [ 437.109529] ? transfer_xor+0x360/0x360 [ 437.109543] ? radix_tree_lookup+0x22/0x30 [ 437.109559] loop_control_ioctl+0x10c/0x2f0 [ 437.122767] ? loop_add+0x850/0x850 [ 437.122781] ? do_vfs_ioctl+0x74f/0x1060 [ 437.122792] ? loop_add+0x850/0x850 [ 437.122802] do_vfs_ioctl+0x7ae/0x1060 [ 437.122814] ? selinux_file_mprotect+0x5d0/0x5d0 [ 437.122825] ? lock_downgrade+0x6e0/0x6e0 [ 437.122836] ? ioctl_preallocate+0x1c0/0x1c0 17:00:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000080)={0x7, 0x4536}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 437.130945] ? __fget+0x237/0x370 [ 437.130962] ? security_file_ioctl+0x89/0xb0 [ 437.130974] SyS_ioctl+0x8f/0xc0 [ 437.130983] ? do_vfs_ioctl+0x1060/0x1060 [ 437.130995] do_syscall_64+0x1e8/0x640 [ 437.131004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.131021] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 437.178143] audit: type=1400 audit(1565110812.153:61): avc: denied { create } for pid=19066 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 437.179361] RIP: 0033:0x459829 [ 437.179367] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.179380] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 437.179386] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 437.179392] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 437.179399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 437.179404] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 [ 437.204983] audit: type=1400 audit(1565110812.303:62): avc: denied { ioctl } for pid=19066 comm="syz-executor.4" path="socket:[69289]" dev="sockfs" ino=69289 ioctlcmd=0x8981 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:00:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000100)={0xe97a, 0x18, 0x4, 0x2, "bddcbe9ceaf4a11064293cbe2730da6bbceff593891bfcae16be271feb2ae9d8"}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x100) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x1400) 17:00:15 executing program 0 (fault-call:10 fault-nth:20): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:15 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x400, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e20, @empty}, {0x307, @remote}, 0x0, {0x2, 0x4e22, @broadcast}, 'veth1_to_team\x00'}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="6e55555500000000f6808e5024c90d802e021c3bce5b574204ddb43489c89692ca9de81d97db4df6bad8c0bde7c934b3166b3424a726b500492099752b22eabdae40e90679a809be34c7100b3552600e7c8efd7ba1acc90a799598bd6cdc00eed680b9e8c4103bd8faef1a2753c66bd6f5e77e4f3d7a96d50d"]) 17:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x401, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00']) [ 440.098122] FAULT_INJECTION: forcing a failure. [ 440.098122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.109984] CPU: 0 PID: 19104 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 440.117188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.126591] Call Trace: [ 440.129193] dump_stack+0x138/0x19c [ 440.132834] should_fail.cold+0x10f/0x159 [ 440.136997] __alloc_pages_nodemask+0x1d6/0x7a0 [ 440.141667] ? __alloc_pages_slowpath+0x2930/0x2930 [ 440.146692] cache_grow_begin+0x80/0x400 [ 440.150750] kmem_cache_alloc+0x6a6/0x780 [ 440.154917] ? mempool_free+0x1d0/0x1d0 [ 440.158886] mempool_alloc_slab+0x47/0x60 [ 440.163050] mempool_create_node+0x2d6/0x3d0 [ 440.167491] ? mempool_free+0x1d0/0x1d0 [ 440.171484] ? mempool_kmalloc+0x30/0x30 [ 440.175566] mempool_create+0x3a/0x50 [ 440.179397] bioset_create+0x55e/0x760 [ 440.183319] blk_alloc_queue_node+0xab/0xac0 [ 440.187759] blk_mq_init_queue+0x4a/0xa0 [ 440.191841] loop_add+0x31c/0x850 [ 440.195324] ? transfer_xor+0x360/0x360 [ 440.199321] ? radix_tree_lookup+0x22/0x30 [ 440.203585] loop_control_ioctl+0x10c/0x2f0 [ 440.207933] ? loop_add+0x850/0x850 [ 440.211576] ? loop_add+0x850/0x850 [ 440.215236] do_vfs_ioctl+0x7ae/0x1060 [ 440.219161] ? selinux_file_mprotect+0x5d0/0x5d0 [ 440.224018] ? check_preemption_disabled+0x3c/0x250 [ 440.229047] ? ioctl_preallocate+0x1c0/0x1c0 [ 440.233475] ? security_file_ioctl+0x89/0xb0 [ 440.237887] SyS_ioctl+0x8f/0xc0 [ 440.241261] ? do_vfs_ioctl+0x1060/0x1060 [ 440.245417] do_syscall_64+0x1e8/0x640 [ 440.249325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.254187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.259385] RIP: 0033:0x459829 [ 440.262571] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.270285] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 440.277577] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 440.284855] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xd3, 0xa0000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x9, 0x100000001, 0x5, 0x4, 0x800, 0x100000000}) [ 440.292134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 440.299500] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB]) 17:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x0, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:15 executing program 0 (fault-call:10 fault-nth:21): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x0, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 17:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) [ 440.705380] FAULT_INJECTION: forcing a failure. [ 440.705380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.717249] CPU: 0 PID: 19139 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 440.717259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.717263] Call Trace: [ 440.717285] dump_stack+0x138/0x19c [ 440.717308] should_fail.cold+0x10f/0x159 [ 440.717328] __alloc_pages_nodemask+0x1d6/0x7a0 [ 440.717347] ? __alloc_pages_slowpath+0x2930/0x2930 [ 440.717377] cache_grow_begin+0x80/0x400 [ 440.733897] kmem_cache_alloc+0x6a6/0x780 [ 440.733914] ? mempool_free+0x1d0/0x1d0 [ 440.733928] mempool_alloc_slab+0x47/0x60 [ 440.740139] mempool_create_node+0x2d6/0x3d0 [ 440.740153] ? mempool_free+0x1d0/0x1d0 [ 440.740161] ? mempool_kmalloc+0x30/0x30 [ 440.740169] mempool_create+0x3a/0x50 [ 440.740181] bioset_create+0x55e/0x760 [ 440.740196] blk_alloc_queue_node+0xab/0xac0 [ 440.740211] blk_mq_init_queue+0x4a/0xa0 [ 440.740226] loop_add+0x31c/0x850 [ 440.749045] ? transfer_xor+0x360/0x360 [ 440.749059] ? radix_tree_lookup+0x22/0x30 [ 440.749072] loop_control_ioctl+0x10c/0x2f0 [ 440.820636] ? loop_add+0x850/0x850 [ 440.824266] ? loop_add+0x850/0x850 [ 440.827886] do_vfs_ioctl+0x7ae/0x1060 [ 440.831785] ? selinux_file_mprotect+0x5d0/0x5d0 [ 440.836542] ? lock_downgrade+0x6e0/0x6e0 [ 440.840683] ? ioctl_preallocate+0x1c0/0x1c0 [ 440.845109] ? __fget+0x237/0x370 [ 440.848569] ? security_file_ioctl+0x89/0xb0 [ 440.852970] SyS_ioctl+0x8f/0xc0 [ 440.856327] ? do_vfs_ioctl+0x1060/0x1060 [ 440.860476] do_syscall_64+0x1e8/0x640 [ 440.864364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.869193] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.874365] RIP: 0033:0x459829 [ 440.877545] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.885290] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 440.892719] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 440.899978] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 440.907239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 440.914508] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x75db, 0x103000) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000080)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) fchmod(r1, 0x80) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f00000000c0)) 17:00:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x0, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 17:00:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 0 (fault-call:10 fault-nth:22): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 17:00:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) prctl$PR_GET_SECCOMP(0x15) 17:00:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x10000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040725bd7000fedbdf25010000000000000007410000024c00188000000075647000"/98], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 17:00:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 443.242052] FAULT_INJECTION: forcing a failure. [ 443.242052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.253919] CPU: 1 PID: 19162 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 443.261058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.270425] Call Trace: [ 443.273030] dump_stack+0x138/0x19c [ 443.276687] should_fail.cold+0x10f/0x159 [ 443.280858] __alloc_pages_nodemask+0x1d6/0x7a0 [ 443.285897] ? __alloc_pages_slowpath+0x2930/0x2930 [ 443.290944] cache_grow_begin+0x80/0x400 [ 443.295023] kmem_cache_alloc+0x6a6/0x780 [ 443.299190] ? mempool_free+0x1d0/0x1d0 [ 443.303201] mempool_alloc_slab+0x47/0x60 [ 443.307386] mempool_create_node+0x2d6/0x3d0 [ 443.311811] ? mempool_free+0x1d0/0x1d0 [ 443.315787] ? mempool_kmalloc+0x30/0x30 [ 443.319853] mempool_create+0x3a/0x50 [ 443.323685] bioset_create+0x55e/0x760 [ 443.327575] blk_alloc_queue_node+0xab/0xac0 [ 443.331990] blk_mq_init_queue+0x4a/0xa0 [ 443.336060] loop_add+0x31c/0x850 [ 443.339518] ? transfer_xor+0x360/0x360 [ 443.343492] ? radix_tree_lookup+0x22/0x30 [ 443.347731] loop_control_ioctl+0x10c/0x2f0 [ 443.352057] ? loop_add+0x850/0x850 [ 443.355687] ? loop_add+0x850/0x850 [ 443.359323] do_vfs_ioctl+0x7ae/0x1060 [ 443.363227] ? selinux_file_mprotect+0x5d0/0x5d0 [ 443.367983] ? lock_downgrade+0x6e0/0x6e0 [ 443.372129] ? ioctl_preallocate+0x1c0/0x1c0 [ 443.376531] ? __fget+0x237/0x370 [ 443.379988] ? security_file_ioctl+0x89/0xb0 [ 443.384393] SyS_ioctl+0x8f/0xc0 [ 443.387755] ? do_vfs_ioctl+0x1060/0x1060 [ 443.391916] do_syscall_64+0x1e8/0x640 [ 443.395798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.400642] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 443.405823] RIP: 0033:0x459829 [ 443.409005] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.416726] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 443.423995] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 443.431255] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 443.438514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 443.445781] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000100)={0x1, "a4"}, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2000, 0x0) 17:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 17:00:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, 0x0, 0x0) 17:00:18 executing program 0 (fault-call:10 fault-nth:23): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e22, @multicast2}}) 17:00:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, 0x0, 0x0) 17:00:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x55558ce}) 17:00:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 443.831583] FAULT_INJECTION: forcing a failure. [ 443.831583] name failslab, interval 1, probability 0, space 0, times 0 [ 443.868379] CPU: 0 PID: 19209 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 443.875526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.884880] Call Trace: [ 443.887475] dump_stack+0x138/0x19c [ 443.891112] should_fail.cold+0x10f/0x159 [ 443.895268] should_failslab+0xdb/0x130 [ 443.899244] kmem_cache_alloc_node_trace+0x280/0x770 [ 443.904353] ? mempool_free+0x1d0/0x1d0 [ 443.908320] ? mempool_kmalloc+0x30/0x30 [ 443.912373] ? mempool_create+0x3a/0x50 [ 443.916344] bdi_alloc_node+0x64/0x2e0 [ 443.920226] blk_alloc_queue_node+0xe5/0xac0 [ 443.924648] blk_mq_init_queue+0x4a/0xa0 [ 443.928703] loop_add+0x31c/0x850 [ 443.932169] ? transfer_xor+0x360/0x360 [ 443.936139] ? radix_tree_lookup+0x22/0x30 [ 443.940388] loop_control_ioctl+0x10c/0x2f0 [ 443.944717] ? loop_add+0x850/0x850 [ 443.948337] ? loop_add+0x850/0x850 [ 443.951961] do_vfs_ioctl+0x7ae/0x1060 [ 443.955850] ? selinux_file_mprotect+0x5d0/0x5d0 [ 443.960602] ? check_preemption_disabled+0x3c/0x250 [ 443.965621] ? ioctl_preallocate+0x1c0/0x1c0 [ 443.970037] ? security_file_ioctl+0x89/0xb0 [ 443.974443] SyS_ioctl+0x8f/0xc0 [ 443.977798] ? do_vfs_ioctl+0x1060/0x1060 [ 443.981958] do_syscall_64+0x1e8/0x640 [ 443.985834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.990674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 443.995866] RIP: 0033:0x459829 [ 443.999045] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.006756] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 444.014019] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 444.021280] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000080)=0x1) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x401, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 444.028546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 444.035813] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0xa000}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:19 executing program 0 (fault-call:10 fault-nth:24): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) 17:00:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:19 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) pread64(r0, &(0x7f00000000c0)=""/124, 0x7c, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000180)=@req3={0x4, 0x80000000, 0x9, 0x200, 0x0, 0x7, 0x2}, 0xfffffffffffffea5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000240)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x429b60da54eb86a6, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="7a4ab4106015fcbf036e555555000080"]) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000001c0)=0x4) [ 444.243612] encrypted_key: master key parameter '' is invalid 17:00:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x5) open(&(0x7f00000000c0)='./file0\x00', 0x100, 0xd9) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80080, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="6e55557500000000406a74f676f933d214ea608bb64489397d270147ea6402b7a54c8acfe8e649e43cab2c30e2135cfe0655b04d27611dd34271807ae4d2257cdf1014948d3325570bb4acbe21f8f83e2c9c8bb7468fe1d3fb860a3a51d812d3e396be85f3fa3ef290b3effc2ad2e4a20309c4414a7d"]) 17:00:19 executing program 3: unshare(0x24020400) unshare(0x2020000) [ 444.318812] encrypted_key: master key parameter '' is invalid [ 444.388593] FAULT_INJECTION: forcing a failure. [ 444.388593] name failslab, interval 1, probability 0, space 0, times 0 [ 444.439820] CPU: 0 PID: 19256 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 444.446983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.456340] Call Trace: [ 444.458932] dump_stack+0x138/0x19c [ 444.462612] should_fail.cold+0x10f/0x159 [ 444.466760] should_failslab+0xdb/0x130 [ 444.470750] kmem_cache_alloc_trace+0x2e9/0x790 [ 444.475415] ? _raw_spin_unlock_irqrestore+0x95/0xe0 [ 444.480522] wb_congested_get_create+0x15b/0x360 [ 444.485305] wb_init+0x502/0x7c0 [ 444.488685] ? __raw_spin_lock_init+0x2d/0x100 [ 444.493306] cgwb_bdi_init+0xe7/0x1f0 [ 444.497122] bdi_alloc_node+0x22b/0x2e0 [ 444.501094] blk_alloc_queue_node+0xe5/0xac0 [ 444.505505] blk_mq_init_queue+0x4a/0xa0 [ 444.509594] loop_add+0x31c/0x850 [ 444.513065] ? transfer_xor+0x360/0x360 [ 444.517060] ? radix_tree_lookup+0x22/0x30 [ 444.521289] loop_control_ioctl+0x10c/0x2f0 [ 444.525798] ? loop_add+0x850/0x850 [ 444.529463] ? loop_add+0x850/0x850 [ 444.533098] do_vfs_ioctl+0x7ae/0x1060 [ 444.536979] ? selinux_file_mprotect+0x5d0/0x5d0 [ 444.541763] ? ioctl_preallocate+0x1c0/0x1c0 [ 444.546211] ? security_file_ioctl+0x89/0xb0 [ 444.550650] SyS_ioctl+0x8f/0xc0 [ 444.554007] ? do_vfs_ioctl+0x1060/0x1060 [ 444.558148] do_syscall_64+0x1e8/0x640 [ 444.562041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.566885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 444.572093] RIP: 0033:0x459829 [ 444.575274] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.584516] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 444.591811] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 444.599100] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 444.606378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 444.613657] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:19 executing program 0 (fault-call:10 fault-nth:25): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x452800, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x1000, 0x0, 0x10001, 0x100000000}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2, 0x100}) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x163, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000080)="acfffada2f0e994701f5b01fbb6da60c54522d73c319", 0x16) 17:00:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) 17:00:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:20 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000100)={0x20, 0x2, 0x6b23, 0x4, 0x10001}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000240)=ANY=[@ANYBLOB="6e5555124331eb0e15bd94a16b11247396c6e0382cf19d9aa11dfdbe2f1af55c06adb83c00000000049edd9e1932529768516147a9f5f5416295ad0ed702fe3c685be1045c04c8be5e0d115d5b10deba729aa8a4fb4f20250acbea8738e785022b32ab55f3bafb782dd78f7eb61042ef7c4efd1b823b05b1b459e26677960f4ee92769d7a15c91cea4c1ca5d9a1de5f5e42ab99b1727c0139855743e621da3708cadc6b80ee355fc"]) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000080)) [ 444.933336] FAULT_INJECTION: forcing a failure. [ 444.933336] name failslab, interval 1, probability 0, space 0, times 0 17:00:20 executing program 3: r0 = socket$inet6(0xa, 0x81000000000001, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000024000b0500"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) [ 444.974798] CPU: 1 PID: 19287 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 444.981984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.991348] Call Trace: [ 444.993950] dump_stack+0x138/0x19c [ 444.997590] should_fail.cold+0x10f/0x159 [ 445.001776] should_failslab+0xdb/0x130 [ 445.005765] kmem_cache_alloc_trace+0x2e9/0x790 [ 445.010827] blk_alloc_queue_stats+0x40/0x100 [ 445.015351] blk_alloc_queue_node+0x121/0xac0 [ 445.019852] blk_mq_init_queue+0x4a/0xa0 [ 445.023900] loop_add+0x31c/0x850 [ 445.027338] ? transfer_xor+0x360/0x360 [ 445.031305] ? radix_tree_lookup+0x22/0x30 [ 445.035545] loop_control_ioctl+0x10c/0x2f0 [ 445.039872] ? loop_add+0x850/0x850 [ 445.043500] ? do_vfs_ioctl+0x83/0x1060 [ 445.047492] ? loop_add+0x850/0x850 [ 445.051122] do_vfs_ioctl+0x7ae/0x1060 [ 445.055012] ? selinux_file_mprotect+0x5d0/0x5d0 [ 445.059763] ? lock_downgrade+0x6e0/0x6e0 [ 445.063903] ? ioctl_preallocate+0x1c0/0x1c0 [ 445.068303] ? __fget+0x237/0x370 [ 445.071758] ? security_file_ioctl+0x89/0xb0 [ 445.076178] SyS_ioctl+0x8f/0xc0 [ 445.079529] ? do_vfs_ioctl+0x1060/0x1060 [ 445.083671] do_syscall_64+0x1e8/0x640 [ 445.087540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.092388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 445.097562] RIP: 0033:0x459829 [ 445.100733] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.108427] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 445.115704] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 17:00:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 445.123054] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 445.130412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 445.137696] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:20 executing program 0 (fault-call:10 fault-nth:26): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x480002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000080)=0x3) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="78470f4a50eee87f"]) 17:00:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000240)) 17:00:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setfsgid(r1) 17:00:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xdc, 0x2) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x1}) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000340)) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x8200) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) write$P9_RGETATTR(r2, &(0x7f0000000280)={0xa0, 0x19, 0x2, {0x410, {0x81, 0x2, 0x7}, 0x10, r3, r4, 0x400, 0xa1e5, 0x2, 0x5, 0x2, 0x7f, 0x4, 0x7, 0x8ec, 0x2, 0x800, 0x7, 0xfcf, 0x6, 0x80000001}}, 0xa0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x401, 0x4, 0x0, 0x4, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x10000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 445.494943] FAULT_INJECTION: forcing a failure. [ 445.494943] name failslab, interval 1, probability 0, space 0, times 0 [ 445.546818] CPU: 0 PID: 19329 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 445.553987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.563354] Call Trace: [ 445.565961] dump_stack+0x138/0x19c [ 445.569611] should_fail.cold+0x10f/0x159 [ 445.573771] should_failslab+0xdb/0x130 [ 445.577749] kmem_cache_alloc_node_trace+0x280/0x770 [ 445.583301] blkg_alloc+0x93/0x5a0 [ 445.586852] ? __lockdep_init_map+0x10c/0x570 [ 445.591351] blkcg_init_queue+0x27/0x410 [ 445.595415] blk_alloc_queue_node+0x7bc/0xac0 [ 445.599910] blk_mq_init_queue+0x4a/0xa0 [ 445.603968] loop_add+0x31c/0x850 [ 445.607420] ? transfer_xor+0x360/0x360 [ 445.611390] ? radix_tree_lookup+0x22/0x30 [ 445.615623] loop_control_ioctl+0x10c/0x2f0 [ 445.619953] ? loop_add+0x850/0x850 [ 445.623579] ? loop_add+0x850/0x850 [ 445.627204] do_vfs_ioctl+0x7ae/0x1060 [ 445.631088] ? selinux_file_mprotect+0x5d0/0x5d0 [ 445.635836] ? lock_downgrade+0x6e0/0x6e0 [ 445.639990] ? ioctl_preallocate+0x1c0/0x1c0 [ 445.644395] ? __fget+0x237/0x370 [ 445.647847] ? security_file_ioctl+0x89/0xb0 [ 445.652260] SyS_ioctl+0x8f/0xc0 [ 445.655618] ? do_vfs_ioctl+0x1060/0x1060 [ 445.659761] do_syscall_64+0x1e8/0x640 [ 445.663645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.668485] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 445.673665] RIP: 0033:0x459829 [ 445.676847] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.684556] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 17:00:20 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 17:00:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 445.692609] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 445.699872] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 445.707143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 445.714410] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:20 executing program 0 (fault-call:10 fault-nth:27): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x2, 0x43, 0x8000, 0x6, 0x8001, "e0f48b95549a3617944c516a4e40436fe443cc", 0x3, 0xfffffffffffffff7}) 17:00:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x88, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@deltfilter={0x24, 0x2d, 0x121, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0xfff1}, {0x0, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 17:00:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) r2 = socket(0x0, 0x80007, 0x0) recvfrom$llc(r2, &(0x7f0000000040)=""/98, 0x62, 0x2020, 0x0, 0x0) [ 446.065906] FAULT_INJECTION: forcing a failure. [ 446.065906] name failslab, interval 1, probability 0, space 0, times 0 [ 446.086510] CPU: 1 PID: 19369 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 446.093649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.103011] Call Trace: [ 446.105605] dump_stack+0x138/0x19c [ 446.109232] should_fail.cold+0x10f/0x159 [ 446.113395] should_failslab+0xdb/0x130 [ 446.117368] kmem_cache_alloc_node_trace+0x280/0x770 [ 446.122461] ? retint_kernel+0x2d/0x2d [ 446.126346] ? blk_throtl_dispatch_work_fn+0x2f0/0x2f0 [ 446.131619] throtl_pd_alloc+0x61/0x9a0 [ 446.135582] ? blk_throtl_dispatch_work_fn+0x2f0/0x2f0 [ 446.140854] blkcg_activate_policy+0x111/0x5a0 [ 446.145435] ? init_timer_key+0xdc/0x300 [ 446.149488] blk_throtl_init+0x42f/0x5b0 [ 446.153545] blkcg_init_queue+0x193/0x410 [ 446.157685] blk_alloc_queue_node+0x7bc/0xac0 [ 446.162186] blk_mq_init_queue+0x4a/0xa0 [ 446.166270] loop_add+0x31c/0x850 [ 446.169732] ? transfer_xor+0x360/0x360 [ 446.173710] ? radix_tree_lookup+0x22/0x30 [ 446.177940] loop_control_ioctl+0x10c/0x2f0 [ 446.182261] ? loop_add+0x850/0x850 [ 446.185885] ? do_vfs_ioctl+0x83/0x1060 [ 446.189860] ? loop_add+0x850/0x850 [ 446.193489] do_vfs_ioctl+0x7ae/0x1060 [ 446.197370] ? selinux_file_mprotect+0x5d0/0x5d0 [ 446.202143] ? lock_downgrade+0x6e0/0x6e0 [ 446.206286] ? ioctl_preallocate+0x1c0/0x1c0 [ 446.210705] ? __fget+0x237/0x370 [ 446.214175] ? security_file_ioctl+0x89/0xb0 [ 446.218582] SyS_ioctl+0x8f/0xc0 [ 446.221954] ? do_vfs_ioctl+0x1060/0x1060 [ 446.226108] do_syscall_64+0x1e8/0x640 [ 446.229992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.235460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.245350] RIP: 0033:0x459829 [ 446.256461] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.273997] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 446.296364] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 446.305724] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 446.316227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 446.323505] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 0 (fault-call:10 fault-nth:28): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 3: syz_genetlink_get_family_id$tipc(0x0) stat(0x0, 0x0) getuid() stat(0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:00:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x1b, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x5) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x3) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_score\x00') setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x348, 0x0, 0x118, 0x0, 0x0, 0x0, 0x278, 0x278, 0x278, 0x278, 0x278, 0x3, &(0x7f0000000180), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x80000001}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x7}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x3, 0x81}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="6e5555550021f6291e29e4109507f5b955c04e23990000930ea2720600b8104e75a18660b1ffee2c7659616101c103a147320c393c1991f00d188d0d403d2ad337e94a66593941b1cabe1e96a1156fa58391f90c53aa778be22cf91ed909201a8f843144ccf14b3105d2c768dbbb1a1f5ccf0ed78325236e05263c374533"]) 17:00:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:21 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x8020, 0x0) 17:00:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 446.744204] FAULT_INJECTION: forcing a failure. [ 446.744204] name failslab, interval 1, probability 0, space 0, times 0 [ 446.757479] CPU: 0 PID: 19403 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 446.764644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.774043] Call Trace: [ 446.774071] dump_stack+0x138/0x19c [ 446.774092] should_fail.cold+0x10f/0x159 [ 446.774111] should_failslab+0xdb/0x130 [ 446.774124] __kmalloc+0x2f0/0x7a0 [ 446.774134] ? kmem_cache_alloc_trace+0x623/0x790 [ 446.774145] ? check_preemption_disabled+0x3c/0x250 [ 446.774154] ? retint_kernel+0x2d/0x2d [ 446.774169] ? blk_stat_alloc_callback+0x84/0x2e0 [ 446.774182] ? queue_set_hctx_shared+0x220/0x220 [ 446.774194] blk_stat_alloc_callback+0x84/0x2e0 [ 446.774207] ? blk_mq_can_queue+0x50/0x50 [ 446.774220] blk_mq_init_allocated_queue+0x85/0x1050 [ 446.774236] ? blkcg_init_queue+0x1a3/0x410 [ 446.780569] ? blk_alloc_queue_node+0x7c5/0xac0 [ 446.780586] blk_mq_init_queue+0x62/0xa0 [ 446.780600] loop_add+0x31c/0x850 [ 446.780611] ? transfer_xor+0x360/0x360 [ 446.780623] ? radix_tree_lookup+0x22/0x30 [ 446.780635] loop_control_ioctl+0x10c/0x2f0 [ 446.780644] ? loop_add+0x850/0x850 [ 446.780657] ? loop_add+0x850/0x850 [ 446.780667] do_vfs_ioctl+0x7ae/0x1060 [ 446.780678] ? selinux_file_mprotect+0x5d0/0x5d0 [ 446.780689] ? lock_downgrade+0x6e0/0x6e0 [ 446.780701] ? ioctl_preallocate+0x1c0/0x1c0 [ 446.780714] ? __fget+0x237/0x370 [ 446.780732] ? security_file_ioctl+0x89/0xb0 [ 446.780744] SyS_ioctl+0x8f/0xc0 [ 446.792556] ? do_vfs_ioctl+0x1060/0x1060 [ 446.792570] do_syscall_64+0x1e8/0x640 [ 446.792578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.792595] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.792603] RIP: 0033:0x459829 [ 446.792609] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.792621] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 446.792627] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 17:00:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 446.792633] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 446.792640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 446.792645] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:22 executing program 0 (fault-call:10 fault-nth:29): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) [ 447.046602] EXT4-fs (sda1): re-mounted. Opts: (null) 17:00:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 3: madvise(&(0x7f0000bde000/0x8000)=nil, 0x8000, 0x9) 17:00:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[]) 17:00:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x1, 0x1b, 0x2, 0x1, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') [ 447.276074] FAULT_INJECTION: forcing a failure. [ 447.276074] name failslab, interval 1, probability 0, space 0, times 0 [ 447.301277] CPU: 1 PID: 19444 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 447.308434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.317796] Call Trace: [ 447.320403] dump_stack+0x138/0x19c [ 447.324053] should_fail.cold+0x10f/0x159 [ 447.328234] should_failslab+0xdb/0x130 [ 447.332218] kmem_cache_alloc_node_trace+0x280/0x770 [ 447.337326] ? _find_next_bit+0xee/0x120 [ 447.341395] ? __sanitizer_cov_trace_pc+0x9/0x60 [ 447.346160] __kmalloc_node+0x3d/0x80 [ 447.349980] blk_mq_init_allocated_queue+0x17e/0x1050 [ 447.355178] ? blkcg_init_queue+0x1a3/0x410 [ 447.359495] ? blk_alloc_queue_node+0x7c5/0xac0 [ 447.364254] blk_mq_init_queue+0x62/0xa0 [ 447.368326] loop_add+0x31c/0x850 [ 447.371775] ? transfer_xor+0x360/0x360 [ 447.375741] ? radix_tree_lookup+0x22/0x30 [ 447.379982] loop_control_ioctl+0x10c/0x2f0 [ 447.384318] ? loop_add+0x850/0x850 [ 447.387941] ? loop_add+0x850/0x850 [ 447.391570] do_vfs_ioctl+0x7ae/0x1060 [ 447.395475] ? selinux_file_mprotect+0x5d0/0x5d0 [ 447.400223] ? lock_downgrade+0x6e0/0x6e0 [ 447.404366] ? ioctl_preallocate+0x1c0/0x1c0 [ 447.408773] ? __fget+0x237/0x370 [ 447.412230] ? security_file_ioctl+0x89/0xb0 [ 447.416648] SyS_ioctl+0x8f/0xc0 [ 447.420018] ? do_vfs_ioctl+0x1060/0x1060 [ 447.424186] do_syscall_64+0x1e8/0x640 [ 447.428080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.432922] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 447.438116] RIP: 0033:0x459829 [ 447.441313] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.449025] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 447.456315] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 447.463678] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000300)=ANY=[]) [ 447.470950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 447.478214] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:22 executing program 0 (fault-call:10 fault-nth:30): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:22 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0,workdir=.']) 17:00:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e555555000000000f2014508308b8d3a8fb1fa6b6811401b4e00842d7e4402e8a6fe9c95be82f61bcf3ab8fa137fbdaaa705b23ca7a10714fdb11591359bf97c41ae01187fc86923661b6ff073135ff3041a78ab134bcc5618c428e62909b731cf87e0c31477079970105e47aa1002e4617a7623be9797b145b5e1776d542da0bef67ae23c364fe562aaa0bbc07e208ecaacdee27df678a244df3cec28706b2577537dc404738bebf64a691288712d33a9e68769c"]) 17:00:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x1000000000, 0x400800000004, 0x0, 0x8401, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:22 executing program 3: exit(0x0) readlink(0x0, 0x0, 0x0) [ 447.695957] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 447.704858] overlayfs: 'file0' not a directory [ 447.790580] FAULT_INJECTION: forcing a failure. [ 447.790580] name failslab, interval 1, probability 0, space 0, times 0 [ 447.837121] CPU: 0 PID: 19478 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 447.844285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.844291] Call Trace: [ 447.844314] dump_stack+0x138/0x19c [ 447.844335] should_fail.cold+0x10f/0x159 [ 447.864046] should_failslab+0xdb/0x130 [ 447.864062] kmem_cache_alloc_node_trace+0x280/0x770 [ 447.864081] __kmalloc_node+0x3d/0x80 [ 447.876936] blk_mq_init_allocated_queue+0x17e/0x1050 [ 447.882128] ? blkcg_init_queue+0x1a3/0x410 [ 447.886458] ? blk_alloc_queue_node+0x7c5/0xac0 [ 447.886477] blk_mq_init_queue+0x62/0xa0 [ 447.895211] loop_add+0x31c/0x850 [ 447.898663] ? transfer_xor+0x360/0x360 [ 447.898677] ? radix_tree_lookup+0x22/0x30 [ 447.898690] loop_control_ioctl+0x10c/0x2f0 [ 447.898701] ? loop_add+0x850/0x850 [ 447.915016] ? loop_add+0x850/0x850 [ 447.918650] do_vfs_ioctl+0x7ae/0x1060 [ 447.922545] ? selinux_file_mprotect+0x5d0/0x5d0 [ 447.927297] ? lock_downgrade+0x6e0/0x6e0 [ 447.931447] ? ioctl_preallocate+0x1c0/0x1c0 [ 447.935950] ? __fget+0x237/0x370 [ 447.940806] ? security_file_ioctl+0x89/0xb0 [ 447.952380] SyS_ioctl+0x8f/0xc0 [ 447.961334] ? do_vfs_ioctl+0x1060/0x1060 [ 447.965747] do_syscall_64+0x1e8/0x640 [ 447.970425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.976512] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 447.982133] RIP: 0033:0x459829 [ 447.985929] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.996323] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 448.011240] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 448.021654] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 448.031980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 448.042039] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="6e55555500000000ccf47b4071ef46c30809ce9aae82c946df65e90d2489518f9c70eea0856a119d642299506ff5683febc0939764233ebbed1c8284d2e0b4589a8eeda57c86b94c4e6a7184dd49890cfb3fb490aa5ddc329b47ad96ef3f136cf3afdc25fefc55e1"]) 17:00:23 executing program 0 (fault-call:10 fault-nth:31): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:23 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x100000, 0x100000}) 17:00:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x164) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x74, 0x0, [0x5cee0bf8, 0xc3a, 0x4, 0x7]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000040)) 17:00:23 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 448.362284] FAULT_INJECTION: forcing a failure. [ 448.362284] name failslab, interval 1, probability 0, space 0, times 0 [ 448.388109] CPU: 0 PID: 19510 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 448.395262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.404626] Call Trace: [ 448.407410] dump_stack+0x138/0x19c [ 448.411064] should_fail.cold+0x10f/0x159 [ 448.415243] should_failslab+0xdb/0x130 [ 448.419241] kmem_cache_alloc_node_trace+0x280/0x770 [ 448.424376] ? lock_downgrade+0x6e0/0x6e0 [ 448.428520] ? check_preemption_disabled+0x3c/0x250 [ 448.433555] __kmalloc_node+0x3d/0x80 [ 448.437372] blk_mq_realloc_hw_ctxs+0x581/0xe80 [ 448.442073] blk_mq_init_allocated_queue+0x210/0x1050 [ 448.447293] ? blkcg_init_queue+0x1a3/0x410 [ 448.451632] ? blk_alloc_queue_node+0x7c5/0xac0 [ 448.456316] blk_mq_init_queue+0x62/0xa0 [ 448.460392] loop_add+0x31c/0x850 [ 448.463854] ? transfer_xor+0x360/0x360 [ 448.467840] ? radix_tree_lookup+0x22/0x30 [ 448.472098] loop_control_ioctl+0x10c/0x2f0 [ 448.476420] ? loop_add+0x850/0x850 [ 448.480055] ? do_vfs_ioctl+0x83/0x1060 [ 448.484566] ? loop_add+0x850/0x850 [ 448.488195] do_vfs_ioctl+0x7ae/0x1060 [ 448.492092] ? selinux_file_mprotect+0x5d0/0x5d0 [ 448.496867] ? check_preemption_disabled+0x3c/0x250 [ 448.501886] ? ioctl_preallocate+0x1c0/0x1c0 [ 448.506300] ? security_file_ioctl+0x89/0xb0 [ 448.510724] SyS_ioctl+0x8f/0xc0 [ 448.514086] ? do_vfs_ioctl+0x1060/0x1060 [ 448.518240] do_syscall_64+0x1e8/0x640 [ 448.522146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.527003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 448.532193] RIP: 0033:0x459829 [ 448.535397] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 448.543099] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 448.550366] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 17:00:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 448.557699] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 448.564998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 448.572288] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:23 executing program 1: prctl$PR_GET_THP_DISABLE(0x2a) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x40140) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xeb6, 0x8, 0x101, 0x7fff, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0xffffffffffffff01}, 0x8) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x10, 0x0, 0xfffffffffffffffd, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r4 = getpid() perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x6cbad72c, 0x0, 0x20, 0x101, 0x0, 0x8001, 0x400, 0xc, 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x1000, 0x1, 0x3ff, 0x100, 0xffffffffffffff80, 0x5, 0x3, 0x100, 0x0, 0x401, 0x401, 0x5c, 0x9, 0x7, 0xfffffffffffff801, 0x2, 0x81, 0x7, 0x3, 0xef0, 0x1dc3, 0xffffffffffffff81, 0x100, 0x7b, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0x6, 0x3, 0x5, 0x100000001, 0x100000001, 0x80000000}, r4, 0x1, r3, 0x2) 17:00:23 executing program 0 (fault-call:10 fault-nth:32): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x3}, 0x4) 17:00:23 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000001240)={0xc025, 0x1}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000000)={0x6, 0x0, &(0x7f0000000240)="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", &(0x7f0000000180)="de583992e8f64c75b16ad0b901f778d104fb2ff7e93089f4e95850ab47a1d5c2dd17fd146a82477cf3a20842cf878c93137eedc2eaa740d704cd79b7c70bb28d8d7f23012029476615e3ab6f58", 0x1000, 0x4d}) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000080)={0x4, 0x9, @name="3e298b10ae627126d6ecfb6161798a312e7e0d110a2100a3ee5646447d4372ff"}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x980000, 0x10001, 0x100000000, [], &(0x7f00000000c0)={0x9d0b63, 0xb31c, [], @ptr=0x1f}}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000140)) 17:00:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='\b']) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r3, r2}}, 0x18) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000080)={0x3, 0x1, [0x101, 0x100000000, 0x0, 0xffff, 0x4e33, 0x100, 0x2, 0x571]}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 17:00:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x17, 0x0, 0x0}) 17:00:24 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x1, 0x4000000000000000, 0x2, "5352a26efee3b5cf0f191b8f078900"}) [ 448.945280] FAULT_INJECTION: forcing a failure. [ 448.945280] name failslab, interval 1, probability 0, space 0, times 0 [ 448.971255] CPU: 1 PID: 19551 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 448.978396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.987760] Call Trace: [ 448.990364] dump_stack+0x138/0x19c [ 448.994005] should_fail.cold+0x10f/0x159 [ 448.994021] should_failslab+0xdb/0x130 [ 448.994035] kmem_cache_alloc_node_trace+0x280/0x770 [ 449.007232] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 449.012686] ? __kmalloc_node+0x3d/0x80 [ 449.016653] ? rcu_read_lock_sched_held+0x110/0x130 [ 449.021667] __kmalloc_node+0x3d/0x80 [ 449.025460] sbitmap_init_node+0x251/0x3e0 [ 449.029692] blk_mq_realloc_hw_ctxs+0x5fa/0xe80 [ 449.034387] blk_mq_init_allocated_queue+0x210/0x1050 [ 449.039571] ? blkcg_init_queue+0x1a3/0x410 [ 449.043894] ? blk_alloc_queue_node+0x7c5/0xac0 [ 449.048561] blk_mq_init_queue+0x62/0xa0 [ 449.052632] loop_add+0x31c/0x850 [ 449.056080] ? transfer_xor+0x360/0x360 [ 449.060057] ? radix_tree_lookup+0x22/0x30 [ 449.064292] loop_control_ioctl+0x10c/0x2f0 [ 449.068605] ? loop_add+0x850/0x850 [ 449.072228] ? loop_add+0x850/0x850 [ 449.075849] do_vfs_ioctl+0x7ae/0x1060 [ 449.079756] ? selinux_file_mprotect+0x5d0/0x5d0 [ 449.084512] ? lock_downgrade+0x6e0/0x6e0 [ 449.088685] ? ioctl_preallocate+0x1c0/0x1c0 [ 449.093112] ? __fget+0x237/0x370 [ 449.096569] ? security_file_ioctl+0x89/0xb0 [ 449.100980] SyS_ioctl+0x8f/0xc0 [ 449.104341] ? do_vfs_ioctl+0x1060/0x1060 [ 449.108663] do_syscall_64+0x1e8/0x640 [ 449.112555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.117404] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.122588] RIP: 0033:0x459829 [ 449.125772] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.133488] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 17:00:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="4ffc1c1fb9"]) [ 449.140762] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 449.148028] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 449.155295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 449.162561] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:24 executing program 0 (fault-call:10 fault-nth:33): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x8, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x80) write$selinux_load(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757814e69d53324e0eaba36633bdabf317c7085e3342b9d42d9a50c2700a474c7398a9cfeffb1bcd401e16dc4a2106b48bd405041f01800000000000001f40db22b03602b36bc21175f9b6df264861b9bd09f129af948f04a4b93f41fbd3b7f90bb71f400cb2c68519c7c246ad8a0023a51e0c122127189b1c000fddf20d32d9e79135c243df94a49185ada358f84a8975778b4f85f89ac81086cdd7ec0a198611a0ff278e62ecd43ec3d06bd695affdef5478c190c6cf5cd2445ab78bfd80a3abc4526423170dd483053c449abb13ab92ae23c51c0faf94b98b85c006150d5c"], 0xee) r3 = userfaultfd(0x80000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$SIOCRSACCEPT(r1, 0x89e3) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 17:00:24 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)="85"}) 17:00:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x101400) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 17:00:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}}, 0x40001) close(r0) 17:00:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/132) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x300, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[0x8, 0x9]}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 449.507849] FAULT_INJECTION: forcing a failure. [ 449.507849] name failslab, interval 1, probability 0, space 0, times 0 [ 449.563592] CPU: 1 PID: 19583 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 449.570746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.570759] Call Trace: [ 449.570782] dump_stack+0x138/0x19c [ 449.570801] should_fail.cold+0x10f/0x159 [ 449.570819] should_failslab+0xdb/0x130 [ 449.570840] kmem_cache_alloc_node_trace+0x280/0x770 [ 449.570855] ? kasan_kmalloc+0xce/0xf0 [ 449.582842] blk_alloc_flush_queue+0x54/0x2b0 [ 449.582861] blk_mq_realloc_hw_ctxs+0x710/0xe80 [ 449.612834] blk_mq_init_allocated_queue+0x210/0x1050 [ 449.618063] ? blkcg_init_queue+0x1a3/0x410 [ 449.622408] ? blk_alloc_queue_node+0x7c5/0xac0 [ 449.627099] blk_mq_init_queue+0x62/0xa0 [ 449.631191] loop_add+0x31c/0x850 [ 449.634652] ? transfer_xor+0x360/0x360 [ 449.638658] ? radix_tree_lookup+0x22/0x30 [ 449.642931] loop_control_ioctl+0x10c/0x2f0 [ 449.647290] ? loop_add+0x850/0x850 [ 449.650935] ? loop_add+0x850/0x850 [ 449.654585] do_vfs_ioctl+0x7ae/0x1060 [ 449.658663] ? selinux_file_mprotect+0x5d0/0x5d0 [ 449.663480] ? lock_downgrade+0x6e0/0x6e0 [ 449.667669] ? ioctl_preallocate+0x1c0/0x1c0 [ 449.672106] ? __fget+0x237/0x370 [ 449.675610] ? security_file_ioctl+0x89/0xb0 [ 449.680034] SyS_ioctl+0x8f/0xc0 [ 449.683429] ? do_vfs_ioctl+0x1060/0x1060 [ 449.687611] do_syscall_64+0x1e8/0x640 [ 449.693004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.697905] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.703286] RIP: 0033:0x459829 [ 449.706504] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.714326] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 449.721745] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 449.729060] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:00:24 executing program 3: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x0, 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_open_procfs(0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgroups(0x0, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) accept4(0xffffffffffffffff, &(0x7f0000000300)=@x25={0x9, @remote}, &(0x7f00000000c0)=0x80, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000), 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000), 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0x0, r1, 0x0, 0xe, &(0x7f0000000180)='$-=proccpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() sendmsg$unix(r1, &(0x7f0000001440)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="e74e007405705f8512225f603d109c8c8c7fa4f22f680a5a8cfa49a82c0c790a33d757ec989dfdbc9bc060174f01bcaab7b91e1bbfa270b9d5c09ef4d611c1cc297d0e7a8ef34c066ce8bfa1da12b23c5bdce42d2f3f1383afde82e5b5356ce4abaa7dd24bc05b34c880c06c3e1f9ef2321a36d097d1768d585a1bd216fce83243dbab59745c4833fcedaa06c30c8d4960f1e46b471c8e899bcf84", 0x9b}], 0x2, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @rights={{0x24, 0x1, 0x1, [r1, r1, r1, r0, r0]}}], 0x80, 0x4048081}, 0x20008041) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x2, 0xff, 0x200, 0x341, 0x1ff, 0x7ff}) 17:00:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) [ 450.092215] FAULT_INJECTION: forcing a failure. [ 450.092215] name failslab, interval 1, probability 0, space 0, times 0 [ 450.112182] CPU: 0 PID: 19624 Comm: syz-executor.0 Not tainted 4.14.136 #32 [ 450.119329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.128687] Call Trace: [ 450.131292] dump_stack+0x138/0x19c [ 450.134964] should_fail.cold+0x10f/0x159 17:00:25 executing program 3: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x0, 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_open_procfs(0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgroups(0x0, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) accept4(0xffffffffffffffff, &(0x7f0000000300)=@x25={0x9, @remote}, &(0x7f00000000c0)=0x80, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000), 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 450.191363] ? loop_add+0x850/0x850 [ 450.194998] ? do_vfs_ioctl+0x74f/0x1060 [ 450.199053] ? loop_add+0x850/0x850 [ 450.202680] do_vfs_ioctl+0x7ae/0x1060 [ 450.206582] ? selinux_file_mprotect+0x5d0/0x5d0 [ 450.211338] ? lock_downgrade+0x6e0/0x6e0 [ 450.215499] ? ioctl_preallocate+0x1c0/0x1c0 [ 450.219911] ? __fget+0x237/0x370 [ 450.223378] ? security_file_ioctl+0x89/0xb0 [ 450.227804] SyS_ioctl+0x8f/0xc0 [ 450.231177] ? do_vfs_ioctl+0x1060/0x1060 [ 450.235331] do_syscall_64+0x1e8/0x640 [ 450.239221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.244067] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 450.249284] RIP: 0033:0x459829 [ 450.252470] RSP: 002b:00007f5d9eea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 450.260190] RAX: ffffffffffffffda RBX: 00007f5d9eea3c90 RCX: 0000000000459829 [ 450.267462] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000006 [ 450.274734] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 450.282025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d9eea46d4 [ 450.289299] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 0000000000000008 17:00:25 executing program 0 (fault-call:10 fault-nth:35): timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f00000000c0)={0x5, {0x1, 0x7, 0x7d4b, 0x7}, {0x3a, 0x0, 0x9, 0x7}, {0x3f9f, 0x9}}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x145e00, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='n\x00(U\x00\x00\x00\x00']) 17:00:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:25 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x2103) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080)=0x80, 0x4) 17:00:25 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 17:00:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x1ffff, 0x0) ioctl$KDDISABIO(r1, 0x4b37) 17:00:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) select(0x40, &(0x7f0000000040)={0xff, 0x800, 0x3, 0x5, 0x8, 0x0, 0x1, 0xffff}, &(0x7f0000000080)={0x3, 0x1, 0x10, 0x9, 0x100, 0x5, 0x4e, 0x20}, &(0x7f00000000c0)={0x0, 0x57, 0x1ff, 0x100000000, 0x6, 0x6, 0x9, 0xffffffffffff0001}, &(0x7f0000000100)={0x0, 0x7530}) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x100, 0x44) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000180)={0x9, 0x80, 0x2, 0x40, 0x1f, 0x3, 0x9, 0x3854, 0x0, 0x40, 0x5}, 0xb) 17:00:25 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 450.802870] Unknown ioctl 21521 [ 450.856542] Unknown ioctl 21521 17:00:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x8}, 0x18) 17:00:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sched\x00') write$P9_RFLUSH(r0, 0x0, 0x0) 17:00:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000180)={0xe3, 0x200, 0x8, 0xc9, &(0x7f0000000080)=""/201, 0x77, &(0x7f0000000200)=""/119, 0x96, &(0x7f0000000280)=""/150}) 17:00:26 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x60000) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x80) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xa, 0x8, "bd50c99548418a483f17a17befb881cc1cf428fb86e5e0ed0d682a9325e005b16313020d949af1c3406e461111d4442693e74480bdf9163db031a99e06ea1c2b", "31a774eeff4c87b5d1da95abba9d384246f79c7668bfc4df8045dff02f5b5b8c", [0x101, 0x5dda]}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) r6 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r6, &(0x7f0000000280)=""/204, 0xcc) 17:00:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') getdents(0xffffffffffffffff, &(0x7f0000000000)=""/27, 0x1b) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x80800) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000001740)) r1 = gettid() clone(0x8840000, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xf253) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc_llcp, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000001580)='IPVS\x00') wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, 0x0) 17:00:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 451.286899] Unknown ioctl 19247 [ 451.301057] Unknown ioctl 19458 [ 451.321565] Unknown ioctl 19586 17:00:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:26 executing program 1: r0 = getuid() r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)='\a', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000540)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000180)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'sha512-generic\x00'}}) r3 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000340)="0519b5d6446ca860a1748640fdbdc71d3cf0b1588c152db3a0ff2281db096b164b2ef753c5e51cb43c14f3dc43d5829ad61c2af37e175dcb3d3e654091c1071e649747fd9f6fee7405bc8e0f033386e04675b9f876f277b40b75b790e9472c9b29fd83f6a869b82e57db25d527edb1d7653e4ab54890deff43bad1ef13dfea3b8a7fff182bb2eccc05c50c962fc89d4078aea70e1a98cdd38af74bd5de5369d84ccf6ef5f2d6582bed5484897f79bb5add132a6e7cbd359cfb7426febbaaf39ad92013b02871cb505c", 0xc9, 0x4}, {&(0x7f0000000440)="9adeb4ec4d196e3bac4be63940c465eb9be6245392520b6dc1d3e17971e89ac28fb220afe5ca2ae634e572c58d7ae370ebd9b12fd9e360570788370a0cb1df9fdbc7e6df5353e63653ee7af229bd5ea230ee2c0c3470425df3b383d25f5def204c", 0x61, 0x6}, {&(0x7f00000004c0)="749749bb5c0342c0ba740e5c0eb4e7f49db4cbbe9aac931e1b4dc98bd84bc863d04def8afdae3949ecd4bf1ae95a5dbed19aff52606d4980a7fc67af612ef9c07788411f6b70f677ce06bede7916f64e1c5156d62db5a38854afd1f28bab2df93f8f4ca199e7fe", 0x67}, {&(0x7f0000000600)="7dc56a762217ecb69ab669de8cd6e369fa87cbbbdbfeb8da47017834a892dce2ff83d39f4885bbd4aa3da889a9a0aada4d1cebad718c8ec0e2e365b83bc0d33609617fb5710146bea4f9742b20d3cf1fec524e7769e9461547aaa8c78cacd70e07d2909a06980f2da667b6f4144a416589fb7193fa097ab3b8e1c600d98990d397790bdff7d748a93a", 0x89, 0xff}], 0x4000, &(0x7f00000002c0)={[{@shortname_lower='shortname=lower'}], [{@uid_gt={'uid>', r0}}]}) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:26 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000000c0)={0x3, 0x7, 0x7, 0x3ff, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/49) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 451.366248] Unknown ioctl 19247 [ 451.369767] Unknown ioctl 19458 [ 451.388842] Unknown ioctl 19586 [ 451.497322] Unknown ioctl -1068477168 17:00:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0xffffffffffff8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x8, 0x7fff}) r2 = getpgid(0xffffffffffffffff) r3 = gettid() setpgid(r2, r3) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="21071a2e10f9765fe1528aeca155a48314d0259dc6273126"]) [ 451.595157] Unknown ioctl 19585 [ 451.616781] Unknown ioctl -1068477168 17:00:27 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000440)=""/204, 0xcc) 17:00:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') getdents(0xffffffffffffffff, &(0x7f0000000000)=""/27, 0x1b) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x80800) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000001740)) r1 = gettid() clone(0x8840000, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xf253) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc_llcp, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000001580)='IPVS\x00') wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, 0x0) 17:00:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="396466782f000000a447cf3101cb48f845c17e74ebf0c43480dea88d147ceb54403f1853c42e424b1fdbdcf6fc43db3007c9d1aa61d1dc71d8036e30eb322a940237eb086b6a9154f38f152084b4b88b79021460589c86bb6727ceeb5116d0787bbb2326330362698a80fe99ae18ded98efde3f488261c85313c481a928fc2bf2b81e45f662f538cd9a76d7e2d"]) 17:00:27 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x2801) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:27 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x80000) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="6e55555500000000910192d904dddbd0a8de23cce91050b93817d9e439419545d9f1757b3f0b16ed19ccbb53b66b9744cd1bc61a4d56b753a76ae126c55cf09c37fb7c692ee6e3efcd92a6fa457dc2987fa8541c491099e87b5aca4c983e01b77884c7fb4cc461"]) 17:00:27 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) ioctl(r3, 0x4, &(0x7f0000000080)="c171cd8905eaca9dbb7ab73447663609457b37ec32f5f157457312f222507de2ebc473ab97ce57ebb006b63fef94d3661d0b425f781f7682") 17:00:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:29 executing program 4: r0 = shmget$private(0x0, 0x1000, 0xa00, &(0x7f0000fff000/0x1000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) r2 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x0, 0x24000) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x8000, r1, r2, r3, r5, 0x4, 0x2}, 0x9, 0xffffffff, 0x24, 0x101, r6, r7, 0x3}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r9, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="6e969e5502000000"]) 17:00:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000000c0)=""/148) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x1f, 0x1f, 0xfffffffffffffffc, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') getdents(0xffffffffffffffff, &(0x7f0000000000)=""/27, 0x1b) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x80800) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000001740)) r1 = gettid() clone(0x8840000, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xf253) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc_llcp, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000001580)='IPVS\x00') wait4(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, 0x0) 17:00:29 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x10000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r6 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r6, &(0x7f0000000280)=""/204, 0xcc) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000080)={r5}) 17:00:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) 17:00:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) [ 454.472725] Unknown ioctl 0 [ 454.484390] Unknown ioctl 19585 17:00:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x2, 0x10000) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000080)="9f50d41fc844da503a3ea959ac54ff355653bd4eb215b41dad114844043b441f5cf3a88cd51d1991b6c0c58692209cd073e77e32c14654a956d33b966db0a05ab21b750fcd066e89f1805109945e2d55365d08dbd9938e12ee660279ffbc7371dccef02543242872192584c248d2832ed04c45f933e94eb918df65e09a9d6d906291ab686a14926cce131a48c53c1e7eb34ba45dc3e4905f4a922c30df8bdfc7599c0b5eb870da5677ac500a310f868f64f0dd6aedd8397a626eb703fd2187abdc0d8f890351601fb07662ddb7", &(0x7f0000000200)=""/81}, 0x18) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x2, 0xc32, "538bfd5ce052a2a2181b8f07892e113600"}) [ 454.616951] ptrace attach of "/root/syz-executor.3"[19785] was attempted by "/root/syz-executor.3"[19788] 17:00:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xffffffff) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80, 0x0) fsync(r2) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000100000000"]) 17:00:29 executing program 3: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x0, 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='m\x14Bnts\x00') read$eventfd(r0, &(0x7f00000002c0), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) getgroups(0x3, &(0x7f0000000280)=[0x0, 0xee00, 0xee00]) socket$inet6_udplite(0xa, 0x2, 0x88) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getegid() getgroups(0x4, &(0x7f0000000200)=[0x0, 0x0, r2, 0x0]) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) 17:00:29 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x80000) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)=""/104) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000240)={0x6f1, {{0x2, 0x4e21, @loopback}}, 0x1, 0x4, [{{0x2, 0x4e20, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}]}, 0x290) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="513c109f0df936"]) 17:00:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000080)={{0x7, 0x1}, {0x8, 0x800}, 0x20, 0x3, 0x1f}) r2 = add_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)="02737364493741d3789a93122398cb5974f4927349f7f17b3de6e2fa433f2cb8cda9ff8a25a0a6c1b761a4475556ce19d101cedd26f642c27f0fbae8ba593dd31e39284df8f72509d4ed7ecf", 0x4c, 0xfffffffffffffff9) keyctl$revoke(0x3, r2) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x3ff) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000a004e200000000100000000000000000000000000000000490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a004e2400000081fe88000000000000000000000000010104000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000004ff02000000000000000000000000000105000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000019000000000000000a004e22000000010000000000000000000000000000000001f0ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000001ff010000000000000000000000000001018000"/656], 0x290) 17:00:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:32 executing program 3: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x0, 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='m\x14Bnts\x00') read$eventfd(r0, &(0x7f00000002c0), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) getgroups(0x3, &(0x7f0000000280)=[0x0, 0xee00, 0xee00]) socket$inet6_udplite(0xa, 0x2, 0x88) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getegid() getgroups(0x4, &(0x7f0000000200)=[0x0, 0x0, r2, 0x0]) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) getegid() getgroups(0x4, &(0x7f0000000200)=[0x0, 0x0, r2, 0x0]) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)=')\x00', 0xffffffffffffffff}, 0x30) r2 = getpgid(0xffffffffffffffff) setpgid(r1, r2) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) mkdir(&(0x7f0000000100)='./file0\x00', 0x80) 17:00:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x10000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000080), 0x4) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[]) 17:00:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x5, 0x121600) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:35 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:35 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2200, 0x94) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000100)={0xd000, &(0x7f0000000080), 0xa, r1, 0x3}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) prctl$PR_SET_FPEXC(0xc, 0x110000) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:35 executing program 3: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x0, 0x0}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='m\x14Bnts\x00') read$eventfd(r0, &(0x7f00000002c0), 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) getgroups(0x3, &(0x7f0000000280)=[0x0, 0xee00, 0xee00]) socket$inet6_udplite(0xa, 0x2, 0x88) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getegid() getgroups(0x4, &(0x7f0000000200)=[0x0, 0x0, r2, 0x0]) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200002, 0x0) r3 = fcntl$getown(r1, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000000c0)={{0x7, 0x5, 0x9, 0x3cb, '\x00', 0x3}, 0x0, 0x102, 0x7, r3, 0x4, 0xd4, 'syz0\x00', &(0x7f0000000080)=['*md5sum.(\x00', ')vboxnet0!eth1ppp0[\x00', '#GPL\x00', '/dev/kvm\x00'], 0x2c, [], [0xfffffffffffff800, 0x8, 0x200, 0x21]}) 17:00:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:35 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, 0xffffffffffffffff, 0x1}) readv(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:00:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x4b4ba3a4}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000003c0)={r3, 0x80000001, 0x4, [0xc7, 0x7, 0x5, 0x8]}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) connect(r4, &(0x7f0000000780)=@xdp={0x2c, 0x2, r5, 0x38}, 0x80) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x3, 0x8, 0x6}) r6 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x0, 0x20000) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x2d, &(0x7f00000002c0)={0x8, {{0x2, 0x4e24, @multicast1}}}, 0x88) 17:00:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x7) 17:00:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 460.802539] Unknown ioctl 21525 [ 460.847128] Unknown ioctl 21525 17:00:36 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:00:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:36 executing program 1: r0 = dup(0xffffffffffffffff) bind$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e) getsockname$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:36 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x4000400000002, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0x1000}, 0x1006) 17:00:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="08000f3c0d1a0000"]) 17:00:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10, 0x0, &(0x7f0000000000)) 17:00:38 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x8000, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xf6}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:38 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@shortname_win95='shortname=win95'}, {@rodir='rodir'}]}) 17:00:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) fcntl$getflags(r0, 0x409) 17:00:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) get_robust_list(r2, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0), 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000240)=0x18) ptrace$peek(0xffffffffffffffff, r2, &(0x7f0000000340)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [{0x4, 0x5}, {0x5, 0x9}], r3}, 0x18, 0x2) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) [ 463.822704] FAT-fs (loop3): bogus number of reserved sectors [ 463.828718] FAT-fs (loop3): Can't find a valid FAT filesystem 17:00:39 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000080)) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:00:39 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x9d0, @dev={0xfe, 0x80, [], 0x26}, 0x8}, @in6={0xa, 0x4e20, 0x8, @rand_addr="6f339afcdd901a4ee4123c512f5452a9", 0x29}, @in={0x2, 0x4e22, @multicast1}], 0x48) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r1, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x40) [ 463.973085] FAT-fs (loop3): bogus number of reserved sectors [ 464.007669] FAT-fs (loop3): Can't find a valid FAT filesystem [ 464.009076] Unknown ioctl 8826 [ 464.047683] Unknown ioctl 8826 17:00:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 17:00:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x20000002000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @rand_addr, @multicast1}, &(0x7f0000000080)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r2}) 17:00:41 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0xfffffffffffffffd) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x10000000000002, 0x200) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xb3, "b3f02df6797caac1936df2a0a40db78f1f04e0e2e40905f313f0167d29f810ff3e4d97e05be0de23bce8842f13df860d2441dda3070e4403ea15ff38c2e93078d6973bd82bbfaba408eb94ee7a9c353fb86d9e0170779e843da987ad0018328317c8b7552279a70f723ba46d7ebea306349664fea6013fc51c7773fcb9a2693d51243f6532824f188ec52013beab878ee7c839f99bd77c3adbbab9e36cedef292b6723950de68f332851bf3a49c9e612438eec"}, &(0x7f0000000140)=0xbb) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0xfb9}, &(0x7f0000000200)=0x8) 17:00:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0xff}) 17:00:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)) 17:00:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x4, 0x4, 0x4, 0xff}, 0x3c) bpf$MAP_CREATE(0x4, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 17:00:42 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TIOCEXCL(r0, 0x540c) syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) fstat(r2, &(0x7f00000000c0)) 17:00:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x800000000000008, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)={0x8, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 17:00:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:44 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'bdev\x00'}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x1041, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="8c030000000000003300000004000000000000000000000000e100000700757e4f0bcb94f3861b0148b8cdc85c54000000000000000000000000000000000000000000000000000006000000030000000000000000000000fdbb2d07390403000000000000020000000000000003000000000000000300000009000000ffffffff0100000000000000000000000500000004cae5fa3bffff090000000000000000000000000000000000000000000000030000000300000000000000000000003f00000000000000070000000000000000fefffffffffffdfeffffff06000000060003000000000000000000000000000700000000000000"]) 17:00:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TIOCSETD(r0, 0x10, 0x0) 17:00:44 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x301000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000080)=""/5) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:44 executing program 3: semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) 17:00:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @ioapic={0x0, 0x1, 0x5, 0xffffffff, 0x0, [{0x4, 0xdcc0, 0x7, [], 0xe9}, {0x98, 0x0, 0x8001, [], 0x7}, {0xe4, 0x6, 0x7ff, [], 0xd4}, {0x6, 0x33, 0x1f, [], 0x200}, {0x6, 0xaa, 0x200, [], 0x7fffffff}, {0x3, 0x0, 0x9, [], 0x5}, {0x4, 0x3ff, 0x0, [], 0x2}, {0x81, 0x800, 0x0, [], 0xd6}, {0x7f, 0x80, 0x1, [], 0x8}, {0xffff, 0x8, 0x8, [], 0x5}, {0x40, 0x4, 0x800, [], 0x5}, {0x1, 0x9, 0x9, [], 0x25}, {0x101, 0x100000000, 0x5, [], 0x2}, {0x7, 0x0, 0x8, [], 0x101}, {0x1, 0x3, 0xd9e, [], 0x3ff}, {0xcaee, 0x6, 0xfffffffffffffffd, [], 0x2}, {0xffff, 0x400, 0x10001, [], 0x3ff}, {0x5ed14330, 0x7, 0xff, [], 0x80}, {0x1, 0x9, 0x9ff, [], 0x6}, {0x2, 0x5, 0x1b0, [], 0x2}, {0x122, 0x2, 0xe1, [], 0x2}, {0x7, 0xffc0000000000000, 0x7, [], 0xfffffffffffffffe}, {0x100, 0x7, 0x1, [], 0x1e}, {0xffffffff, 0xfffffffffffffffc, 0x2, [], 0x8}]}}) 17:00:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000001180)=[@in={0x2, 0x0, @local}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d24000)=[@in={0x2, 0x0, @multicast1}], 0x10) 17:00:45 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000240)={[], 0xfff, 0x1ff, 0x3c, 0x0, 0x40, 0x0, 0x0, [], 0x4}) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000400)='/dev/input/event#\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='-em1\x00', r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x440003, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x400, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:45 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000004, 0x10, r0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'os2.', 'big_key\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000000c0)=0x8, &(0x7f0000000100)=0x2) 17:00:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/162, 0xa2}], 0x1, 0x68) 17:00:45 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000300)={0x3, 0x0, [{0x6, 0x2, 0x0, 0x0, @irqchip={0x7, 0xdf}}, {0x5, 0x1, 0x0, 0x0, @msi={0x10001, 0x10000, 0x872}}, {0x6, 0x363e82e8c01b04ee, 0x0, 0x0, @sint={0x9, 0x1ff}}]}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'exec ', '{trusted\x00'}, 0xe) [ 470.290154] audit: type=1400 audit(1565110845.383:63): avc: denied { map } for pid=20095 comm="syz-executor.0" path="/dev/ptmx" dev="devtmpfs" ino=14075 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file permissive=1 17:00:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x4002) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) 17:00:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x0, @dev}}) 17:00:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x15c673c53519983}) 17:00:47 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) socket$alg(0x26, 0x5, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:00:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 17:00:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="6e55555599de03000000000000004f7d6f073e4900000000"]) 17:00:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xe212, 0x0) 17:00:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @local}}, 0x7, 0x4, 0x8, 0x0, 0x7}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x1f, @rand_addr="15681f5103606414d0c3061d55f8b1ae", 0x40}]}, &(0x7f0000000280)=0x10) 17:00:48 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) 17:00:50 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x4) sendfile(r0, r1, 0x0, 0x20000102000007) 17:00:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80800, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000180)={0x7, 0x10001}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$netlink(r3, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f00000001c0)=ANY=[@ANYBLOB="015546760500000000005e6be4d7befe85b59836c3c438069ab2c8b5c9d8e495013f5f40629bfa71bed6157a901baabf494a21206020a89ffba06d0dc9f15e9f57898c1c69d17552d543fbc467dbb252f58d17d4f1a4623e12b3712db7dfb907d5de6307db0ba611ba04f3195cafb272e09127c7ccc796ee1ae44da6be"]) 17:00:50 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:00:51 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ubi_ctrl\x00', 0x81, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x3ff}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x9}, 0x8) r2 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x53, 0x0) read(r2, &(0x7f0000000200)=""/4096, 0x1000) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) 17:00:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) accept$inet6(r2, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) 17:00:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000c40)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000c00)=0x8001) fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) getgroups(0x3, &(0x7f00000007c0)=[0xee00, 0xee00, 0xee01]) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000800)={0x3f0, 0xa6263dd6b3b82564, 0x6, [{{0x2, 0x2, 0x5, 0x1, 0x2, 0x3, {0x0, 0x4, 0x0, 0x8, 0x3f, 0xff, 0x9, 0x436, 0x4, 0x1c000000000000, 0x2, r3, r4, 0x4, 0x5}}, {0x1, 0x7ff, 0x9, 0x1f, '/dev/kvm\x00'}}, {{0x4, 0x0, 0xffffffffffffffe5, 0x1, 0x6, 0x0, {0x0, 0x5, 0x7fff, 0x2, 0xfff, 0x1, 0xfffffffffffffffa, 0x6, 0x2800000000000, 0x74, 0x9c, r5, r6, 0x6, 0x3f}}, {0x6, 0xb7, 0x5, 0xffff, 'wlan0'}}, {{0x2, 0x1, 0x6, 0x7f, 0x9, 0x80000000, {0x2, 0x2e9, 0x1000, 0x5, 0x3f, 0x3, 0x101, 0x100, 0xb3a6, 0x4, 0x6, r7, r8, 0x4}}, {0x2, 0x1f, 0x9, 0x0, '/dev/kvm\x00'}}, {{0x6, 0x1, 0x9, 0x0, 0x10000, 0x5, {0x2, 0x3, 0x101, 0x1f, 0x5, 0xff, 0x101, 0xe9, 0x10001, 0x0, 0x7, r9, r10, 0x100000000}}, {0x5, 0x2, 0x2, 0x3, '*:'}}, {{0x6, 0x3, 0x1, 0x1, 0x400, 0x8000, {0x5, 0x2, 0x1, 0x101, 0x3, 0xfec, 0x2, 0x4, 0x9d, 0x5, 0x3f90, r11, r12, 0x20, 0x6}}, {0x1, 0xea2, 0x9, 0xc47d, '/dev/kvm\x00'}}, {{0x3, 0x0, 0x5c86, 0x38c2, 0xffffffff, 0x471, {0x1, 0xffffffff80000001, 0x101, 0xe789, 0xd10, 0x9, 0x5, 0x400, 0x0, 0x6, 0x0, r13, r14, 0x1}}, {0x3, 0xffffffff, 0x9, 0x7, '/dev/kvm\x00'}}]}, 0x3f0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="6e55555580000200"]) 17:00:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xe212, 0x0) 17:00:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000002d00), 0x4000083, 0x4048000) 17:00:51 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000900)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000940)={@rand_addr="dbdb315cc57e1eda7ffcc1a4f82140e5", @loopback, @empty, 0xbc, 0x2, 0x5600000000000000, 0x0, 0x10000, 0x1000124, r1}) readv(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:00:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 17:00:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) kexec_load(0x0, 0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="000000d49405f0fc147c6efe50daee"]) 17:00:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000002d00), 0x4000083, 0x4048000) 17:00:54 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setsig(r5, 0xa, 0x2d) bind$inet(r7, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000240)={0x2, 0x4, 0x47a, 0x0, 0x0, 0x8}) r8 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r8, &(0x7f0000000280)=""/204, 0x218) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000140), 0x4) 17:00:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x197, 0x2000) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000140)=0x5, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='\xde\xb1\xaa\x88]\xd8\xf5\x00\x00\x00\x00\x00\x00\x00\x05\xc5\xa8,k\x9a\x7f\xdah', r2}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0xc165bc08495c09a0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:00:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x3, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)=0x8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x2, 0x0, [{0xffffffffffff7fff, 0x4, 0x0, 0x0, @sint={0x5, 0x9}}, {0x3, 0x1, 0x0, 0x0, @sint={0x0, 0xfff}}]}) setsockopt$inet6_udp_int(r2, 0x11, 0x6e, &(0x7f0000000000)=0x8d4, 0x4) 17:00:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 17:00:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) pipe(&(0x7f0000002580)={0xffffffffffffffff}) write$P9_RAUTH(r1, &(0x7f00000025c0)={0x14, 0x67, 0x1, {0x2}}, 0x14) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000002540)={0x8, &(0x7f0000000080)=""/140, &(0x7f0000002480)=[{0x7, 0x1000, 0xffffffff, &(0x7f0000000200)=""/4096}, {0x5, 0x1, 0x6, &(0x7f0000000140)=""/1}, {0x40, 0x73, 0xffffffff, &(0x7f0000001200)=""/115}, {0xffff, 0x44, 0x20000000000000, &(0x7f0000001280)=""/68}, {0xffffffffffffff46, 0x8a, 0xf0, &(0x7f0000001300)=""/138}, {0x100, 0x1000, 0x1, &(0x7f00000013c0)=""/4096}, {0x1000, 0x98, 0x2, &(0x7f00000023c0)=""/152}, {0xffffffffffffa36b, 0x27, 0x3, &(0x7f0000000180)=""/39}]}) [ 479.189257] Unknown ioctl 21532 17:00:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000003940)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001580)=""/4096, 0x1002) 17:00:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 17:00:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x4002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f00000001c0)={0x80fd, 0x3}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000000c0)={[{0x7ff, 0x5, 0x3c, 0x7e, 0x0, 0x9, 0x8000, 0x400, 0x5, 0xfff, 0x7ff, 0x5, 0x6}, {0x9, 0x9, 0x1ff, 0x3ff, 0x7525, 0x5, 0x100, 0x1d0, 0x3, 0x800, 0xc206, 0x7, 0x20}, {0x5, 0x7, 0x5, 0x8, 0xfff, 0x8, 0x1000, 0xffff, 0xffffffff00000001, 0x20, 0xffffffff, 0x101, 0x2}], 0x2}) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x5, 0x507000) 17:00:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)) 17:00:57 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000140)=@buf={0xaa, &(0x7f0000000080)="ad87a23648909424cb4f82f65f2dd34d982b5930c62b68cf666b29f2e0596bf25143b6671e8f593976cbc4854f5765136af0154336bc8cf6d4ec2c8f767cc169dd2fe409dd1df52d84e2ffe85a539d13d62747a0199d012cba15f3252f4d91ffc0d82cb2610ecab896f522b43dc9e98fa2fdd62a52aae60877d58f9726de2f88405c25ce7366c53b26cbc53ce0427b11621bdeded4ced1698af3c389940e52deb80b45d53101e4d62ca1"}) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:00:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 17:00:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000140)={[{@attr2='attr2'}]}) 17:00:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000080)=""/179) 17:00:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:00:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000000002, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)='&&system\x00', 0xfffffffffffffff8) syz_open_dev$dri(0x0, 0x9, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7fff, 0x20240) 17:00:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/87) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000240)={0x6, 0x0, [{0x7, 0x2, 0x0, 0x0, @sint={0x1f}}, {0x2, 0x4, 0x0, 0x0, @adapter={0x100000001, 0x401, 0x3, 0x9, 0x10000}}, {0x300000000000000, 0x3, 0x0, 0x0, @sint={0x8, 0x5}}, {0x80, 0x7, 0x0, 0x0, @sint={0x7, 0x7}}, {0x4, 0x3, 0x0, 0x0, @msi={0x5, 0x8, 0x100000000}}, {0x80000000, 0x0, 0x0, 0x0, @sint={0xecc, 0xffffffffffffffe1}}]}) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xffffffffffffff85, 0x800) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) [ 482.074621] XFS (loop3): Invalid superblock magic number [ 482.156213] Unknown ioctl 35090 17:00:57 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000003dc0)='/dev/audio#\x00', 0x1, 0x20c80) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000003e00)={0x9, 0xffff, 0x10001, 0xfffffffffffffe01, 0x8}) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000003ec0)=0x3c0, 0x800) r3 = fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) write$P9_RFSYNC(r0, &(0x7f0000004040)={0x7, 0x33, 0x2}, 0x7) getresgid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000003780)={0x0, 0x0}) write$binfmt_elf64(r0, &(0x7f00000040c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x499, 0x0, 0x4, 0xffff, 0x2, 0x3e, 0x8000, 0x35, 0x40, 0x1e5, 0x8000, 0x7fff, 0x38, 0x2, 0x100000001, 0x2, 0x3f}, [{0x7, 0x1000, 0x3f, 0x400, 0x2, 0x5, 0x1, 0x5}], "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", [[], [], [], []]}, 0x574) r9 = getuid() pipe(&(0x7f0000004080)) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003880)={0x0}, &(0x7f00000038c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000003a00)=0xe8) getgroups(0x1, &(0x7f0000003a40)=[0xee00]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003ac0)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000003bc0)=0xe8) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) r16 = getegid() sendmsg$netlink(r2, &(0x7f0000003d80)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000200)={0x10a8, 0x22, 0x400, 0x70bd2b, 0x25dfdbff, "", [@typed={0x8, 0x45, @u32=0x7}, @typed={0x8, 0x43, @pid=r3}, @typed={0x18, 0x49, @str='/dev/input/event#\x00'}, @nested={0x1064, 0x8d, [@typed={0x1004, 0x21, @binary="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"}, @generic="fe659eac5103231c582a1ff2fc85c448e6456467d7cbdc03529742", @typed={0x14, 0x22, @ipv6=@mcast1}, @typed={0x8, 0x1, @u32=0x40}, @typed={0x8, 0x61, @str='\xac\x00'}, @generic="a8c04062f964145d4946aaeb58d92630cf8c4a", @typed={0x8, 0x41, @pid=r4}]}, @generic="69ba7e9e5e5ad603b3d41a"]}, 0x10a8}, {&(0x7f00000012c0)={0x128, 0x3f, 0xaba1b87ff5b31a89, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x60, @fd=r1}, @nested={0x104, 0x2c, [@typed={0x14, 0x8c, @ipv6=@ipv4={[], [], @multicast2}}, @typed={0x8, 0x52, @str='-\x00'}, @typed={0x14, 0x10, @ipv6=@rand_addr="2a939a405ddb9f2d86a869f0fb26cdd0"}, @generic="d4f572f93905c6d81820fa24afcb5c5a9040fd4829b5f12b691e7d5615d075a20f6c31474a6608c50a2eea9f955d1929e6a4e599ceb80b22dff844a97c9fc9dbc8f4414048301599ee879303bdce38fe0e3b8f1c3fd6d51470ea65633e4ca4d0891c06c1803f105732d1f9dd1c36a44b3c1f083164aad6990fa60cb7c7e7aa0bc03d90dc9a9565ec4f947cd3dcb000e7f747588b021e535ae19fcb83bb0a585e276f9009e75038d140bd4137d37bd71374be5ae0304c972aa01e707c70242e5b83f23242a36a7e38d32a53c9", @typed={0x4, 0x28}]}, @nested={0xc, 0x22, [@typed={0x8, 0x8b, @u32=0x800}]}]}, 0x128}, {&(0x7f0000001400)={0x1060, 0x3c, 0x210, 0x70bd28, 0x25dfdbfd, "", [@generic="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", @typed={0x8, 0x17, @u32=0x1}, @generic="bb41b82fe540f3c33d1a485a3cfe691b7920902bfa220cc7477e903e51a6d1171df040c170f1d5fa6fb55bb702084f8a1ad3d62b6e192970377bc497f5f2018439ee581b1f07"]}, 0x1060}, {&(0x7f0000002480)={0x1140, 0x3c, 0x0, 0x70bd26, 0x6, "", [@nested={0x18, 0x19, [@typed={0x14, 0x5f, @ipv6=@ipv4={[], [], @loopback}}]}, @generic="bcc7cf7059e8215e08ef9c428fd1e3ff6377a4ee908807f7ca534c50737973ecc06d256ee287f3a6e33cdda6b536d20ec27e1a7b2763e3002f1ec84f06b0b9b7af49", @typed={0x8, 0x3e, @ipv4=@remote}, @typed={0x1004, 0x82, @binary="c518607a7f04dd1129d2b8a3ac8ccfd6072500bbb0b42e97cb5f616803871c65e3259ce50704accd109935cf87618bab86f8f6ee353330474d3312194ea6aeed3d847b02d08ee9c448f99d5771c95939ae123f63bb1c53392faad3cfcc8bc97a8a343beb56be1f1ae01ef618d6eb691f32fe4efaf7d8291875e5029ebe625b6cbcc70b0dd8958b739279d4c58543b9be3257b2c552fa8704f446db149ea0211ad9081cc5592fa417ed7f71252001e41180de07e934847ea6b9b910cd300fd09178b3eda0bc1fa5a7529fc4bdcc5944254b3bd3d8f997061c6659c0262ac979ad07541579f899db09024286aa3e0a1284b823f059f13cb9fa7476f32cccadf904b63be22a6212923a1f2bb6a6c7c2729784261435130b18c022616cf05f9fa832d9b0cddfddae0f5917d19d3eedd3c1c693f3d0aadd3a6cccdbe2116e3ce1e6494ab68d8acb99d46bed8e318422f1395407dba67b427a8029a94da0ca2e649108d2e843b015fbffba540539ab93b263032d5629be775b1d52d604fc745db5970be17df97c6d3e936bd0a4ca4392819f75b517030a77f40eac03bd74f6d24c8b374e70a8589769177844b6b7cde9980fd775910a2415e44a77ed19ed8b4f913860d517d4faebb9be6cffd5d91773cf3c02a27ef13ba9c9107ee061ca22b9b8a172c241dd6548e1c439b45efaa58a0482f60d45a0441407428991b290563fef219bd8b93d8b244a3efbb63b456385b5cf580da5d724b933f5929d97d0a53650c96961d87364a88d7e05818f87dad3e7934f16158e749414811e1c95ec186550b7c1f6b2bb1fb08ef4237c2547db71088f10d66d76485afd78a9290254c3bf3958ff6d6755257f1f8baafc62f04c57fe3a992ed3a4f4654392ca19b56d3d32b0184629ca3b31c224292eec0bd384d5e8611d04d86c2eb09e86e09ee3bd19e9416fddfa3019d49960b857a5a015e6c02b85394a8ed46374eaa2462218858458b313990bb07c61e235fe2b95e332c476b8b06a5f2411ccd215d1335102739879cf3bf9caae8cc9d0353ca2f8b4274f667376d3ca74072f5fd0e5b98090729946ab1e5cff290bfa74b81e300803d8b1572400a27ae0a37210a2f0f7b4c70976725546470bfb4594445fda483162549cff7b7514a534b06cfbaea9e55e42b5b1a44c949ba42b8e860d701d8360a2402a2278d56fe5e70cad5c698868996f5114896a0c464cb897d95aed3798d4e0a91c8632d0dc26819c693097e0ad0b685250ec0031134afbb282a2759daa9cb6f35b11f476ac3af974196b2ff00510fd7a1065bc32abd3916338c8840a736fd067df0b239576b8a0ab5b4f1a8a62a4456b444a523458228d3fea5f73a4f74c5cc31937bbb640ef356ff4bc0088d52f92578f790dc492e758a17f0b6581a2d81c45051a1944f010ceb903bddfe140606dabf99cf1abc54472cc9e9977482a6f375d5c32558294ed0a4d20debf300c49f58e27429085d6b94fda8f2ccf0ef0cc8edf7d45af58e9c6fd36ef5d54debba9fc840e54a0ed3856829af94dc0e75d4459e740b52643a1e04470a38e4ff9af36f1f97f194414ae28237330f79a653fa4dfd2d6c959c21aeb24dc510c507fd52fa485df6d509b31b599e545f6af9c613d934325377f504729d97047962393b93f88cf59abc8b66d5ef51924a760526c2a58d9ec18f5cd08194ad9bd35412e3376c4942719632203de0ec52a7bdac486c49591c34285eb622bc681a42ef13dbeadba9af5c94f02e00a2b663118e62e74e103162d78da2bc86b5487511d91461f8596362f4689f63f202aa25264753687e176536b25212bf55319d641883bbe6b42f5bcb50f45ee8e45696b3056dceac6ef7cb904e0f2fbe4facb1cada5fd0360f24026594c81a8229752c607249af7d66fd04ceb82cb74b7ac5db1f9c9337a68eeb7f22debd48243cbeb3ee45cad7f01b20ea251a419e68f8ecc9583d3e8921a06ad56452c0fa1ce1531b821b1e799b0378341845be26541666606e1f4a095fba3f344e872cc1bf473b7607db7b3a7f45c7fb2f2d280379b546aa3758e30c8ecdc7b6c6357253b19c0b12334ab6dd9021320e01a59e94048847b77f6c25b88d0ef17e57ec37399365edd482319cb9bda75a115abea40fb3cda7e45d26008eb3f725b137ce9aa86ff59ce8c50d62705b6f0ed764152dc00afdfcc86f26deed8dbcc4dba9ebd5a794d83930335b42d330bc7050ef371c685dec3b45d2830dfb21a58470c3312a485e23d9c4a271226a0db7d374640739171b9f0505584e606db57431acae8dd2d91b92a79fc4b71125eeaa04b1324836e696f4e180c1ca48cb9c9f64035e4e12af0a0df695bc153e1d85fa8e62b9cf485f867cb4c2016758fa242adbc929525491abbc3005f54a2dcfeda548b33fa0eb66efc39e35befcdb063dde555ffcc36e72f60bec79b9b10f36f6cccae5235bc1a3f273d9d0230842a4208a799004d6bf51bf5e26ac16ea65ebcc663333c1dfd14bac210ce24de47ad85db6245fbc174a0ad5932f3a3ec33b37515974b472b72b6b29f4a328cc191045b7c7a84158fa474e0dfbea4f701cc31759c715e10fd23a9bda41305373227f2ece0c562fbd74373a7900a2ae6760f5f53931d6f74840d3e6cf037c4ed68b859462671b3668dc96ad092e493a3b9fa1d8dbccd9786ef090823e5d200bb8487307da0df5c01236972fcaed9ba4963f98e52a946b04515d7dc0eea6bfb1600bf5642cba0ce3f771d9da790ba925345b16c661213f9a714619900c71975fa29871c44ec9147b91ece90fa39e777c8b79d4db115ec88a6a4e61d77bd2d544b6e84a20e761a22f37f455ee95558f6beb3181edb7a8ce81e5b30d036815be84bb50f3b5a60b9a81bafe919082e7a704cdc91eea1e25b1537cd42ab3c01c4d568311dfb9f519103ae9f51aed073516e66372f6a076f9c5b9f6e78e5bd645a359bb95d550265b357dcd470bde01b825b2850fec3cd6281da0de5173eaf810e4ffd477efa9ec6ee31ec5e2e933ec5bec315c490bd0f3613e7f5b96ac919af5e6a8510a8d2f85a0a8835444a8355a678d63670b2ba3b45a6ed4f72eaef50c06337e27a42aca9abf052e358ba5cbf4c87b62229276031c002e60eb2098e5698e10f173a4c8cc4aa2ddee18542f2532b4015c06c3be506e437a56b3c8d38004852f4946c445617a856216c88ced6be562788169e505c02b65d46bee8043dc5b5a1790c3443bb6088361e7e43a44a8cfa82ba3ced910d15aeeceda22a6658154211d5601a8cf5cc87375be16db5710cfbc95f7178258d686b00e3396bb990d50d11539eeb627272af089ca90a6494da9fce1ca441181a1b6699f074dae82b7ff0eaa73970fe839e2fa77c9b8186c498e274b13c30faf4103512365d5e15e13389f74a85a6c9ec3a89bb28769a2d4aa9d754566c52421d6f6ab81a8559ed072868abaf095d629e9a00a7a2c492e6917f5bea49adf1d9963fc61a65d6f197264cf611741fdb826d86a3736974d81cd9203a2b84c91157da499241b3cdeb8d65d8262cfc9a479cb886e54038c8d5ae89e6da029b578efb97005d599c374365ddc129513e89d6f49228a2859cbddb85abce8047f5bebea1a9cd7481de33e0dda512a66f7ce4c40ad5f9a7f5a50c71bb6091fdb9d98dfd673e0bb810de00c78b2c2f394f14cdf51b3304838df4627ec9a2e62d03cf07b7093decfe9827f7d9da9a16368819d1b37d727ad50eb4a05ef3f159fa613683cb5ea065fa44de4add2dc2c65cb8dde3592c9945a139c1d5ae0de55484f75e82b410d15bd6e55a97ef7febae040df00fcaa7458322c195eff517ce22aac4d40007202f011cdbb588dcd195128eaae8902cec775c2ef807c30485d6eb0bba2639b09992a49a8a6822dea236897fa5b09571e45034531a77f7176ee20b50fc626c4d01d8fe2dd390abb2c5ff494911e5159a3aa442f1b03cf5f1a0242948e07467b03625532a89944fc66adb43af8f5f300b4b6553fa52636375d330d053bc2fe91faa10b9314c61e199a9bba9e3f14e46d2547fe661da7c67ce9d498256c266b31e521eea61c94cdc66bc8f5787a710044b726ac6231d176a9b24679498f1c40762c1932167c2b1df06b608336bcfc15010c02b279d56264cff4f3abd90bc295608e794054685722c8f3fe2f265d8964ae426838064728e64fb83598a7d20b23128e4c3ab1c13366fd72196bf0c52fe44fe8abf5fa89877370ea169788740e6188a20fdac6e645566d8e6b85fe3563fcc039cd31c5fc3010250294b0eddd61203d88f53bbed6e9fd1e51f964bb70005bfceec9cd8a5cf98239144455a3493bed7ee30796a5d56862e8c18ec1b3abdff50ea1ebdc9c694fe6d6ba08b166f34597187e594f795ad204ef1daab56fc4f567785d831f6fa6a153690239095ab7f49dc416954dc3ffe11c0ccac5f73d4944b3da7b17ac170fd872861128a0f9f7d65cfa5f440de470250f74841360d0415d5891138bb3a160cce239a664805ed455dbeb84ecbe3387c56edd82c7e730da58a1e713ceb18933ae7f1f6312510f635e04d54221381198b6a673f96998f1297f166af9a5f99bad1b39562c97b902043d6c9a39ef0b9a487e35564d168c6306423404524669ee6303a0473bd3a3d5642d8f4dcd4f8a901b95af1823bd84f1ccde5dcab1d12767c825d95e8b34141108b000cdffeedb8b45b5874f42756d3051c23eac4668da763641a8bb36203f8d561f7afe97dc257542fb7dd0fa2290bbc20c9ca55d819e8110da538bdd4e6fb535fbba3785dd65ec98a16c8fc906dd9a79194e317e5ab458d7cf30360f0d5a75349fcfc74cd04a54a044d4e923d56399ffead711a0b483a31ab65c6ca78118ac934fef43422f1ed8778ee68cc55102cf73b8b2f1237352dbdb5e3248b22afd4357458a87190274ce1df164ead8689adb7073a2bc0bee8369f30f6068ca72b3280d79f542742bcc65c6cb0b94c6bfce660e294e78acec68e0fcad4e2a49e8ff88259ba2c27da2aac24595cca4355b0a016ec8cbd1a5f555c1c8f1e5675dbc65570ceff0ec16ec92e8ab3f135b77f734e930ed0ff979f5e96512b9266165e9fdd14ec35ae0bc113fc0cb8caf3716bc2e74e152dfa4bbd99211a563208065bb007e1ce23a25aa9930657b1de8b57531f9dfc591e8a9015367c2e62ada70c41eaa16d666883149050099c13aa801b4d0c10645399e71a3196ca394971b9ee1d53c66ef96f3556ae02dde852fa57a176cf0ed920ab84cc6518ec589daf7e8b5debbbab4018cc986714752ccf75afd0eb95836981b1ff59eb51974a680778613895282a1dd6df20009d3038f0283e47c3b42f475561b08ce37dd3d22a8f4a209471e92bbea04c3656b2fe0a66b8ac0f22129c9d0d782c6812f2bde60b4a53fb6965a7d6f63ae0df2ee16fe887f75eed0f6bd9ed6134aea9200884ff3d4854fe321093926ad8749d8859021d3480f6387e25cf42372c7ad37160f92c47bc3db1aca8182a27090acf44679bda7547b444deaaccd5c7abcec06c201088b447c73e99953029fc66fe897dceead786d6a2ce6315f0be90512ce9a138b36db69f5de31f46e1715c038364dd89eafaf126815b172810e638c3c50e709714ea8e8ab72b8772236d94c424e2a3c4e2766e65ab0ef837934c40242fb244ada1f21fd2d6a0a692e9cc667e26cd5d909c9c97b79ab5b7723527d88ef0ea683bcfdb9eb6f2b7594d7e63464a95d27ed0054bc1935ca030c06825b7edb3846c846fb3ee8a44cebef74811"}, @nested={0xc8, 0x42, [@typed={0x4, 0x79}, @typed={0xb8, 0x6, @binary="8cb55cf165e664f1aff794bffa19707526516342641669cdf1172495c777a829fc645455fd1d845289110093614cbf05b7e5246a25a1832af9cbbc900a341b9bd4d56c3d8a9aaac47aeafe46b2e7293efafcfe9de7131f1569eded016e4129dcf43e5cedfc9e456c38aa11c9a50794f79f564f40fdfea3402cf92ddc0c1f09df0ada1e6ea277efc6c919e20a4b256e7d8c1f5439181ff344241572ecf99aa4f9b5c438c0024d49b59da0ee24acb7f73d66"}, @typed={0x8, 0x6a, @ipv4=@multicast2}]}]}, 0x1140}], 0x4, &(0x7f0000003c00)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x30, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x34, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r1, r1, r1]}}, @rights={{0x34, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r1, r1, r1]}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}], 0x160, 0x40000}, 0x20000000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r17 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003e80)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000004000)={&(0x7f0000003e40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003fc0)={&(0x7f0000003f00)={0x94, r17, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x971}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff8000000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x35bf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 17:00:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3b9, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="6e55f1433590"]) 17:00:57 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) readv(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) [ 482.344186] Unknown ioctl 35090 17:00:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x10000000, 0x20, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/161) 17:00:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)={0x55555555555556e}) socketpair(0xf, 0x805, 0x8a, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @loopback}}, [0x4, 0x200, 0x1ff, 0x4, 0x800, 0x10000, 0x6, 0x7, 0x7, 0x2, 0x2, 0x4, 0x383, 0x5, 0x101]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r3, &(0x7f0000000240)=0x4) 17:00:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) 17:00:57 executing program 5: 17:00:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x202000, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000180)=""/4) connect$vsock_dgram(r1, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000100)=0x8000) lremovexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '/dev/sequencer2\x00'}) 17:00:57 executing program 5: 17:01:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:00 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @bcast, @rose={'rose', 0x0}, 0x380, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xfffffffffffff440, 0x1, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1010003}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x8, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7f, 0x19d0f910, 0xeffe}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000240)=ANY=[@ANYBLOB="e200000000000000512c1c7b4242c69cbab799f3f5b28ac6bff44df2ef82c06d6034326ed6adee8a10237a40a4d2e1f890c1a5639a152eccab74aa56b510b73ff7f27dde474c256d04c01677902cec9f28368317ec29a0255b3b2744b5f3f9fe8c9c1c85e89d90c1a84063027ca4245b1a92547834059bc38113a5913dc4b1f29e19fc17f653d4acceae45a6a1e59c292ecd9e9b4b01aa256f1e"]) 17:01:00 executing program 5: 17:01:00 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x1f) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:00 executing program 1: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000080)={0x80000000, 0x101, "8e00aab85c8874cda60307a2d4cdf734c247c58fd59401d073911ed766cec166", 0x80000001, 0x1ff, 0x6, 0x1, 0x2, 0x81, 0x6, 0xffffffffffffffdf, [0xd52, 0x3, 0x3f, 0x7f]}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x1ff, 0xdd3, 0x4104, 0x33, 0x0, 0x8, 0x82200, 0x0, 0x4, 0x7, 0x1, 0x8, 0x3ff, 0x80000000, 0x18, 0x3f, 0x100000001, 0x400, 0x8, 0x100, 0x4, 0x5, 0x1ff, 0x7, 0x400, 0x3f, 0x7fff, 0x400, 0x6727, 0x0, 0x0, 0x0, 0x7, 0x6628, 0x5d8, 0x2, 0x0, 0x9, 0x0, @perf_config_ext={0x10000, 0x4}, 0x8000, 0x2, 0x5, 0x9, 0x6, 0x9, 0x1ff}, r1, 0x6, r0, 0x3) clock_getres(0x7, &(0x7f0000000180)) 17:01:00 executing program 3: 17:01:00 executing program 5: 17:01:00 executing program 3: 17:01:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 17:01:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x200, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000100)=""/125) modify_ldt$write2(0x11, &(0x7f0000000080)={0x3, 0x20001000, 0xffffffffffffffff, 0x1, 0x5, 0xfffffffffffff17d, 0x0, 0x9662, 0x6, 0x1}, 0x10) 17:01:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000100)=""/52, 0x34) 17:01:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x1a4, r3, 0x414, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0xfffffffffffffff9}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbd8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffbbc0}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x84e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x240000}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4008080}, 0x90) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="6e555555070a0000810d3778958a362b424f3651ce76e49e5a50ad191cf83d3858b3305f3edb15be90521d12db8a0e93925aa3dc7926f4651e70d225a8a0317943da94fd735861c227fbab60f660fe9438656c614ba3b1e6a20e949e1eef9d391aa1aa07000000f38289a22102fcbd4eecb9906a110a465052d355749d8766dad24e753a13547a50440dfcf909bb2c62ef880795829820ed0b698dae39621399bc9cb59538b7e637dc68e9eea05332629ad6d98adeddf2786225ded889bc8e886c8cbc17b2ce99650a76534ba90d381b37e511c9482fbc45bffc3f"]) 17:01:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:03 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200a00, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) syz_open_procfs(r1, &(0x7f0000000380)='cgroup\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) splice(r3, &(0x7f0000000040), r2, 0x0, 0x4, 0x0) recvfrom$x25(r0, &(0x7f00000003c0)=""/8, 0x8, 0x40010000, &(0x7f0000000400)={0x9, @remote={[], 0x3}}, 0x12) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000640)=""/11) write$P9_RCREATE(r0, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x80, 0x0, 0x5}, 0x3}}, 0x18) r4 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) futex(&(0x7f0000000440)=0x1, 0x81, 0x2, &(0x7f00000004c0)={r5, r6+30000000}, &(0x7f0000000500)=0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000300)={0x4, 0x6, 0xe64, 0xfffffffffffffe24, &(0x7f0000000540)=""/83, 0xb8, &(0x7f0000000200)=""/184, 0x1b, &(0x7f00000002c0)=""/27}) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$binfmt_elf32(r0, &(0x7f0000000fc0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:01:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00']) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 17:01:03 executing program 5: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000580)="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", 0xf5a}, {&(0x7f0000000180)="21de5f8510f86da296ebc6bffede7d86e0dfaab365e48107b2bb2aa17aaab23a116c227ff9b71912412c891dd72d4cc9dacfa12d0a6765c44fa283483c0bb797d7893771036912f6324d9591eba8a0dc2aaf7b9b443d7d00b8", 0x59}, {&(0x7f0000001580)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) sendmsg$inet(r0, 0x0, 0x20000040) r1 = open(&(0x7f0000000140)='./bus\x00', 0x804002, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000000c0)=0x80000001) sendfile(r1, r1, 0x0, 0x8000fffffffe) 17:01:03 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x9, 0x401}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:03 executing program 4: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000001580)="b90d00b81c749a87e050e2c14f68f0785285b8ec419341b83dca483f4577841d1586a7eb041a728c67fac3de93abab7fbaeca8259523b3c7e7f3c1d899ccd330bf0ab0e5a7dbe29612faee630165dc17bc36d124603074c2aa2cb4bbd690aeec9720b3bc7429c42071c62dd126a941421a74cdae31a0c274e9a845cdcafdc4c0144e179d643657f3c2f842872724528e5bd383a2fe392f7d2e6c287a91495a461d1386ffdc18ed3906cc00a7bacd8a", 0xaf}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@broadcast, @initdev, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000001640)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1e0001ac1e0001000000001c0000000000000000", @ANYRES32=r1, @ANYBLOB="000000017f00000100000000cc000000000000000000000007000000940600000003443004d3ac1414bb7fffffff0000c87900000008000000000000000880000001e000000200000008000000db00000009071b007f00000100000000e00000017f0000017f0000010000000001891b0800000002ac1e0001ac141411e0000001e0000002e0000001863b00000001070e42af0d23b4bc9cb90d0901e0050fa48d8901d482f93e0e19465c3b0304e89c060824a4e7e727b2060cedf5672396d44bcd18d6831307ac14140fe0000002ac1e01017f000001000098b8c80000", @ANYRES32=0x0, @ANYBLOB], 0xff}, 0x20000040) r2 = open(&(0x7f0000000140)='./bus\x00', 0x804002, 0x0) sendfile(r2, r2, 0x0, 0x8000fffffffe) [ 488.123425] input: syz1 as /devices/virtual/input/input8 [ 488.129223] audit: type=1800 audit(1565110863.213:64): pid=20403 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=17855 res=0 [ 488.163957] Unknown ioctl 1074835116 17:01:03 executing program 3: vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000002c0)="11", 0x1}, {&(0x7f0000000380)="888c959fcf7ab7e0d88dc549f3293cd2", 0x10}], 0x2, 0xe) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000800)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3000002, 0x10, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) timer_create(0x5, &(0x7f00000001c0)={0x0, 0x3e, 0x0, @thr={&(0x7f0000000840), &(0x7f0000000140)}}, &(0x7f0000000300)) timer_getoverrun(0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000340)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 17:01:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x1, 0xd, 0xa0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 488.326304] audit: type=1800 audit(1565110863.423:65): pid=20420 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=17859 res=0 [ 488.352321] Unknown ioctl 1074835116 17:01:03 executing program 5: [ 488.400219] audit: type=1800 audit(1565110863.493:66): pid=20403 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=17855 res=0 17:01:03 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) r6 = msgget(0x0, 0x4) msgsnd(r6, &(0x7f0000000080)={0x3, "b22de28bddd6ea423047dd5c3cac672fd17028bc10ff326ccc4d0785b69c9415f418f65f8f28d1cefe9725bf4e204a3ff42adcd54229ae55361e1c56bbeb3c0253b23f30cbf299b3420c445a96ac082f75f4fe388d149871d154110347076922fa98cf4bcc27ed198cdfd3b9085e0fe60fd1cd69850aca9f0e8684e87a307cc04995c17d68dcf148e8b1e0586734c4c28f10c26826f4d8be7d49e0b6abec483955960ca0fd632daddf614a44684d9dc29cd5bd7926d7ae859e6f17da33a099d7670ab6cec4da871f09a664f29b73286dd59a22ad8d7ed620ed874fa0fcfe418870ea827f584112f6f9d8c017dca503b51ed0e023d18f4e"}, 0xff, 0x800) keyctl$get_security(0x11, r5, &(0x7f0000000740)=""/204, 0xcc) 17:01:03 executing program 5: [ 488.552961] Unknown ioctl 19585 [ 488.588557] Unknown ioctl 19585 [ 488.643843] audit: type=1800 audit(1565110863.743:67): pid=20443 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=17859 res=0 17:01:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:06 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x307}, "efa35416963319de", "5ec3a52365b04de7efbf979383577104", "21ab7617", "6630545c41a0131a"}, 0x28) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:06 executing program 4: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000001580)="b90d00b81c749a87e050e2c14f68f0785285b8ec419341b83dca483f4577841d1586a7eb041a728c67fac3de93abab7fbaeca8259523b3c7e7f3c1d899ccd330bf0ab0e5a7dbe29612faee630165dc17bc36d124603074c2aa2cb4bbd690aeec9720b3bc7429c42071c62dd126a941421a74cdae31a0c274e9a845cdcafdc4c0144e179d643657f3c2f842872724528e5bd383a2fe392f7d2e6c287a91495a461d1386ffdc18ed3906cc00a7bacd8a", 0xaf}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@broadcast, @initdev, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000001640)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1e0001ac1e0001000000001c0000000000000000", @ANYRES32=r1, @ANYBLOB="000000017f00000100000000cc000000000000000000000007000000940600000003443004d3ac1414bb7fffffff0000c87900000008000000000000000880000001e000000200000008000000db00000009071b007f00000100000000e00000017f0000017f0000010000000001891b0800000002ac1e0001ac141411e0000001e0000002e0000001863b00000001070e42af0d23b4bc9cb90d0901e0050fa48d8901d482f93e0e19465c3b0304e89c060824a4e7e727b2060cedf5672396d44bcd18d6831307ac14140fe0000002ac1e01017f000001000098b8c80000", @ANYRES32=0x0, @ANYBLOB], 0xff}, 0x20000040) r2 = open(&(0x7f0000000140)='./bus\x00', 0x804002, 0x0) sendfile(r2, r2, 0x0, 0x8000fffffffe) 17:01:06 executing program 5: 17:01:06 executing program 3: 17:01:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:06 executing program 3: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000001580)="b90d00b81c749a87e050e2c14f68f0785285b8ec419341b83dca483f4577841d1586a7eb041a728c67fac3de93abab7fbaeca8259523b3c7e7f3c1d899ccd330bf0ab0e5a7dbe29612faee630165dc17bc36d124603074c2aa2cb4bbd690aeec9720b3bc7429c42071c62dd126a941421a74cdae31a0c274e9a845cdcafdc4c0144e179d643657f3c2f842872724528e5bd383a2fe392f7d2e6c287a91495a461d1386ffdc18ed3906cc00a7bacd8a", 0xaf}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@broadcast, @initdev, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000001640)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1e0001ac1e0001000000001c0000000000000000", @ANYRES32=r1, @ANYBLOB="000000017f00000100000000cc000000000000000000000007000000940600000003443004d3ac1414bb7fffffff0000c87900000008000000000000000880000001e000000200000008000000db00000009071b007f00000100000000e00000017f0000017f0000010000000001891b0800000002ac1e0001ac141411e0000001e0000002e0000001863b00000001070e42af0d23b4bc9cb90d0901e0050fa48d8901d482f93e0e19465c3b0304e89c060824a4e7e727b2060cedf5672396d44bcd18d6831307ac14140fe0000002ac1e01017f000001000098b8c80000", @ANYRES32=0x0, @ANYBLOB], 0xff}, 0x20000040) r2 = open(&(0x7f0000000140)='./bus\x00', 0x804002, 0x0) sendfile(r2, r2, 0x0, 0x8000fffffffe) 17:01:06 executing program 5: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000001580)="b90d00b81c749a87e050e2c14f68f0785285b8ec419341b83dca483f4577841d1586a7eb041a728c67fac3de93abab7fbaeca8259523b3c7e7f3c1d899ccd330bf0ab0e5a7dbe29612faee630165dc17bc36d124603074c2aa2cb4bbd690aeec9720b3bc7429c42071c62dd126a941421a74cdae31a0c274e9a845cdcafdc4c0144e179d643657f3c2f842872724528e5bd383a2fe392f7d2e6c287a91495a461d1386ffdc18ed3906cc00a7bacd8a", 0xaf}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@broadcast, @initdev, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000001640)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1e0001ac1e0001000000001c0000000000000000", @ANYRES32=r1, @ANYBLOB="000000017f00000100000000cc000000000000000000000007000000940600000003443004d3ac1414bb7fffffff0000c87900000008000000000000000880000001e000000200000008000000db00000009071b007f00000100000000e00000017f0000017f0000010000000001891b0800000002ac1e0001ac141411e0000001e0000002e0000001863b00000001070e42af0d23b4bc9cb90d0901e0050fa48d8901d482f93e0e19465c3b0304e89c060824a4e7e727b2060cedf5672396d44bcd18d6831307ac14140fe0000002ac1e01017f000001000098b8c80000", @ANYRES32=0x0, @ANYBLOB], 0xff}, 0x20000040) r2 = open(&(0x7f0000000140)='./bus\x00', 0x804002, 0x0) sendfile(r2, r2, 0x0, 0x8000fffffffe) [ 491.195285] audit: type=1800 audit(1565110866.293:68): pid=20455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=17874 res=0 17:01:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x1c, 0x72a9, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [], @remote}, 0xfffffffffffffffd}}, [0x6, 0xffffffffffffffe1, 0x401, 0x64, 0x80000001, 0x2, 0x6095595, 0xfffffffffffffff7, 0x2, 0x1, 0x6, 0xdfaf, 0x0, 0x1]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={r2, 0x8, 0x30, 0x9, 0x5e18af61}, &(0x7f0000000240)=0x18) [ 491.428884] audit: type=1800 audit(1565110866.523:69): pid=20467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=17868 res=0 [ 491.522544] audit: type=1800 audit(1565110866.523:70): pid=20466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=17869 res=0 17:01:06 executing program 4: 17:01:06 executing program 4: 17:01:06 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2002) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x28683f37f758b2b9) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x6, 0x5, 0x0, 0x100000001, 0x0, 0x400, 0x80000, 0x0, 0x0, 0x6, 0x40, 0x6, 0x9, 0x3, 0x18, 0x0, 0xb870, 0x7, 0x4, 0x80000001, 0x8, 0x5c, 0x7ff, 0x40, 0x75, 0x2, 0x6, 0x9, 0x8327, 0x9, 0x8, 0x15, 0x7, 0x3, 0x0, 0x4, 0x0, 0x101, 0x3, @perf_config_ext={0x7f3, 0x59a}, 0x0, 0x3ff, 0xffffffffff2e036f, 0xd, 0x9, 0xdba9, 0x467}, r2, 0xc, r3, 0x5) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x6, 0x1, 0x64e, 0x4, 0x7}, 0xc) ppoll(&(0x7f0000000380)=[{r4, 0x8100}, {r3, 0x80}, {r0, 0x1}, {r1, 0x2003}, {r5, 0x4004}, {r0, 0x80}, {r5, 0x82}], 0x7, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x9c0f}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) dup(r6) r7 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r7, &(0x7f0000000280)=""/204, 0xcc) 17:01:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:09 executing program 3: 17:01:09 executing program 4: 17:01:09 executing program 5: 17:01:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='\x80\x00\x00@\x00\x00\x00{\x17', 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000000)={0x5, [0x9ff2, 0xa54d, 0x1f, 0x10001, 0x8]}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x18) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000000c0)={0x8, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000080)={0x7, 0x3ff, 0x8, 0x80000, r2}) 17:01:09 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x8}]}, 0xc, 0x1) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:09 executing program 5: 17:01:09 executing program 3: 17:01:09 executing program 4: 17:01:09 executing program 5: 17:01:09 executing program 3: 17:01:09 executing program 4: 17:01:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:12 executing program 3: 17:01:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x31, 0x42) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f00000000c0)=0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000080)={0x1f, 0x81, 0x80000001, @broadcast, 'hsr0\x00'}) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) 17:01:12 executing program 4: 17:01:12 executing program 5: 17:01:12 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x3, 0x5) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet6_mreq(r4, 0x29, 0x1f, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x48, r6, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x48}}, 0x20000850) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:12 executing program 5: 17:01:12 executing program 3: 17:01:12 executing program 4: 17:01:12 executing program 3: 17:01:12 executing program 5: 17:01:12 executing program 4: 17:01:15 executing program 3: 17:01:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x16, 0x8, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:15 executing program 4: 17:01:15 executing program 5: 17:01:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:15 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:15 executing program 5: 17:01:15 executing program 4: 17:01:15 executing program 3: 17:01:15 executing program 5: 17:01:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) accept$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:15 executing program 3: 17:01:15 executing program 4: 17:01:15 executing program 5: 17:01:15 executing program 4: 17:01:15 executing program 3: 17:01:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:18 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000440)) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x10001, 0x3}) 17:01:18 executing program 4: 17:01:18 executing program 5: 17:01:18 executing program 3: 17:01:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x101080) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 17:01:18 executing program 3: 17:01:18 executing program 4: 17:01:18 executing program 5: 17:01:18 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new '], 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) [ 503.441100] Unknown ioctl 8838 17:01:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x3, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001020, 0x0) 17:01:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000300)={{0x0, 0x3}}) [ 503.489866] encrypted_key: master key parameter '' is invalid [ 503.617606] Unknown ioctl 8838 17:01:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = shmget$private(0x0, 0x2000, 0x780001d1, &(0x7f0000ffe000/0x2000)=nil) r2 = getuid() r3 = getgid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f00000003c0), &(0x7f0000000340)=0x0) r6 = dup(r0) getegid() write$FUSE_DIRENTPLUS(r6, &(0x7f0000000680)=ANY=[], 0x0) r7 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000240)={{0x13c, r2, r3, r4, r5, 0x0, 0x3}, 0x80, 0xa9, 0x800, 0x3f, r7, r8, 0xff}) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2c) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:21 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, 0xffffffffffffffb9) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) 17:01:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x3000)=nil) 17:01:21 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) [ 506.367797] encrypted_key: master key parameter '' is invalid [ 506.378562] encrypted_key: master key parameter '' is invalid 17:01:21 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 506.425380] Unknown ioctl -1069525410 17:01:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x8, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = eventfd(0x5) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 506.565428] Unknown ioctl -1069525410 17:01:21 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:21 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) readv(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400080, 0x14) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000080)) 17:01:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:24 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:24 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x103102, 0x0) mkdir(0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r3 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f00000000c0)) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='.\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) rt_sigsuspend(&(0x7f0000000080)={0x663e2261}, 0x8) 17:01:24 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000380)={{0xb7, @rand_addr, 0x4e21, 0x1, 'ovf\x00', 0x1, 0xfff, 0xb}, {@local, 0x4e20, 0x0, 0x80000001, 0x4e, 0x6}}, 0x44) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) recvfrom$x25(r4, &(0x7f0000000080)=""/106, 0x6a, 0x2000, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:24 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 509.440521] audit: type=1804 audit(1565110884.533:71): pid=20684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir068464195/syzkaller.JoX6c6/587/bus" dev="sda1" ino=16621 res=1 17:01:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) [ 509.509308] audit: type=1804 audit(1565110884.603:72): pid=20686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir068464195/syzkaller.JoX6c6/587/bus" dev="sda1" ino=16621 res=1 [ 509.546712] Unknown ioctl -1069525410 17:01:24 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:24 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) [ 509.823630] Unknown ioctl -1069525410 17:01:25 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:25 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 510.081819] Unknown ioctl -1069525410 17:01:25 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) 17:01:25 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) [ 510.287704] Unknown ioctl -1069525410 [ 510.295278] audit: type=1804 audit(1565110885.403:73): pid=20724 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir068464195/syzkaller.JoX6c6/587/bus" dev="sda1" ino=16621 res=1 [ 510.328524] audit: type=1804 audit(1565110885.403:74): pid=20686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir068464195/syzkaller.JoX6c6/587/bus" dev="sda1" ino=16621 res=1 [ 510.363240] audit: type=1804 audit(1565110885.433:75): pid=20724 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir068464195/syzkaller.JoX6c6/587/bus" dev="sda1" ino=16621 res=1 17:01:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:27 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x80000) r1 = syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3a, 0x10000) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x40, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000140)={@local, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x14}, @local, @mcast1, 0x1, 0x8, 0x25e6, 0x400, 0x7ff, 0x0, r2}) 17:01:27 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) 17:01:27 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) [ 512.515443] Unknown ioctl -1069525410 17:01:27 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:27 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:27 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) 17:01:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0xffffffffffffffdb, 0x1000000000003) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000080)=""/132, 0x84}, {&(0x7f0000000200)=""/132, 0x84}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/156, 0x9c}], 0x5, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:27 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80000, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000380)) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x3) write$P9_RAUTH(r2, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x8, 0x4, 0x4}}, 0x14) syz_open_pts(r0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000080)=0xffffffff, &(0x7f00000000c0)=0x4) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) r6 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r6, &(0x7f0000000280)=""/204, 0xcc) 17:01:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) getsockname$tipc(r0, &(0x7f0000000380)=@id, &(0x7f00000003c0)=0x10) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000280)={'eql\x00', {0x2, 0x4e22, @remote}}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000180)={0x2, 0x33, 0x2, 0x10, 0x0, 0x3, 0x4, 0x2a, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x2a, 0xa2, &(0x7f0000000400)="473fb36e6573c123d26f473f9337eb2b047bd77ed3d0e637acb20371f09798e88c190cf9773310ef6ba3", &(0x7f0000000440)=""/162}, 0x28) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000940)={'filter\x00', 0x4}, 0x68) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000300)=0x1, &(0x7f0000000340)=0x4) clock_gettime(0x6, &(0x7f00000009c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000880)={r4, @in6={{0xa, 0x4e23, 0x5, @local, 0x80000000}}}, 0x84) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000000)={0x0, 0x1a, 0x12, 0xe, 0x3, 0x7, 0x5, 0x30, 0xffffffffffffffff}) [ 512.916592] Unknown ioctl -1069525410 [ 512.998188] Unknown ioctl 1076129799 17:01:28 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) [ 513.104640] Unknown ioctl 1076129799 17:01:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:30 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) recvfrom$rose(r1, &(0x7f0000000080)=""/201, 0xc9, 0x1, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x10, 0x4000, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:30 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:30 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r1, 0x5427) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) connect(r4, &(0x7f0000000080)=@tipc=@name={0x1e, 0x2, 0x3, {{0x2, 0x4}, 0x4}}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000240)={&(0x7f0000000100)=""/87, 0x57, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r5, 0x4) r6 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r6, &(0x7f0000000280)=""/204, 0xcc) 17:01:30 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) [ 515.547195] Unknown ioctl 21543 [ 515.551514] Unknown ioctl -1069525410 17:01:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x4180000000000000, 0xd, 0x1f, 0x8, "232446c7a166bcb7e608d7f452c45817d86408911d3d1b5315bc1b5f959b80f8"}) 17:01:30 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:30 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:30 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) [ 515.789271] Unknown ioctl 21543 17:01:31 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r2, 0x0, 0x11, &(0x7f0000000100)='posix_acl_access\x00', 0xffffffffffffffff}, 0x30) setpgid(r4, r5) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) dup(r6) r7 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r7, &(0x7f0000000280)=""/204, 0xcc) 17:01:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfff, 0x80) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x3, &(0x7f00000000c0)=0x4) [ 515.984419] Unknown ioctl -1069525410 17:01:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) 17:01:33 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000080)={0x4, 0x2, 0x1, 0x6, 0x8001}) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:33 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000440)=ANY=[@ANYBLOB="08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cdb2dc4d956b2600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/328]) r5 = dup(r4) write$binfmt_script(r1, &(0x7f0000000680)={'#! ', './file0', [{0x20, '/dev/ptmx\x00'}, {0x20, 'mime_type/ppp1bdevmd5sum'}, {0x20, '/dev/vsock\x00'}, {0x20, '/dev/loop-control\x00'}, {}, {0x20, '/dev/loop-control\x00'}, {0x20, '}'}, {0x20, 't+nodevmd5sumwlan1GPLvmnet1'}], 0xa, "d8a5227e50f1e704058b719375f0f8746e3f50b3c4d9e0801deab427b40b5dfbdc6a76e393720f9ae7dca7b9d4c2eca784750f2d24bb42819dc1615c1feffe050bac05"}, 0xc3) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x4d, "57522531b7121037c4b511a93cd4be0c072c06580bd32a4d6e9608004fa144b45b78ce193cc7c19b49bc91b073fca665dd86f6b65d13659787350bb2d87d82bdb1ad8893aea6f16fd035d15153"}, &(0x7f0000000240)=0x55) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r6, @in6={{0xa, 0x4e24, 0x81, @local, 0x80}}, 0xdbe, 0x7, 0x61e, 0x9, 0x3}, &(0x7f0000000380)=0x98) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0xff, @loopback, 0x1}, {0xa, 0x4e22, 0x4, @loopback, 0x18}, 0xf2, [0xfff, 0x7, 0x1000, 0x7fff, 0x0, 0x3, 0x2, 0xbc0]}, 0x5c) r7 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r7, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) [ 518.591897] Unknown ioctl -1069525410 [ 518.633415] Unknown ioctl -1073172847 17:01:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x8, 0x4, 0xfffffdff, 0x409, "538bfd7cf052a2b91840cf080e26bcc0d1b7d9288b797a1b2e513600"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/keycreate\x00') ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000001c0)={0xc9, 0x8dc}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x3f}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r2, 0xffffffff80000001}, 0x8) 17:01:33 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:33 executing program 5: 17:01:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe212, 0x0) [ 518.881384] Unknown ioctl -1069525410 [ 518.894434] Unknown ioctl -1073172847 17:01:34 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0xfffffffffffffffd) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000000c0)={0x1, {{0xa, 0x4e21, 0x6, @loopback, 0x8000}}}, 0x88) 17:01:34 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)=""/71, &(0x7f0000000100)=0x47) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:34 executing program 5: 17:01:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) pipe2(&(0x7f0000000000), 0x84000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 519.111370] Unknown ioctl -1069525410 17:01:34 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000440)=ANY=[@ANYBLOB="08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cdb2dc4d956b2600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/328]) r5 = dup(r4) write$binfmt_script(r1, &(0x7f0000000680)={'#! ', './file0', [{0x20, '/dev/ptmx\x00'}, {0x20, 'mime_type/ppp1bdevmd5sum'}, {0x20, '/dev/vsock\x00'}, {0x20, '/dev/loop-control\x00'}, {}, {0x20, '/dev/loop-control\x00'}, {0x20, '}'}, {0x20, 't+nodevmd5sumwlan1GPLvmnet1'}], 0xa, "d8a5227e50f1e704058b719375f0f8746e3f50b3c4d9e0801deab427b40b5dfbdc6a76e393720f9ae7dca7b9d4c2eca784750f2d24bb42819dc1615c1feffe050bac05"}, 0xc3) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x4d, "57522531b7121037c4b511a93cd4be0c072c06580bd32a4d6e9608004fa144b45b78ce193cc7c19b49bc91b073fca665dd86f6b65d13659787350bb2d87d82bdb1ad8893aea6f16fd035d15153"}, &(0x7f0000000240)=0x55) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r6, @in6={{0xa, 0x4e24, 0x81, @local, 0x80}}, 0xdbe, 0x7, 0x61e, 0x9, 0x3}, &(0x7f0000000380)=0x98) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0xff, @loopback, 0x1}, {0xa, 0x4e22, 0x4, @loopback, 0x18}, 0xf2, [0xfff, 0x7, 0x1000, 0x7fff, 0x0, 0x3, 0x2, 0xbc0]}, 0x5c) r7 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r7, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000100)=0x80, 0x80800) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000380)=""/100, &(0x7f0000000140)=0x64) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x16}, 0x40, 0x0, 0xff, 0x1, 0x8, 0x9}, &(0x7f0000000440)=0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x402000) ioctl$NBD_DO_IT(r0, 0xab03) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 519.428299] Unknown ioctl -1069525410 [ 519.456824] Unknown ioctl -1073172847 17:01:34 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) dup(0xffffffffffffffff) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x1, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) [ 519.789381] Unknown ioctl -1069525410 17:01:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:35 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000100)="36d0fa03701977987d7edb7beccc96df80154183d4c106d4ffc7b8e4a36497b3a5e4ac6928826780e78194f33673009bf8567e655ce32a63b257073d3a7519e7cbfc5bd11c", 0x45, 0x10001}, {&(0x7f0000000380)="d712baa7482ebf238c2b915f04d7d75f1a977b26db81e85c4f2c8b0facad76325184ef3e71a7c5044e0a5f0e5407d6617e11972cfe70f18197eb0083740e21bc524d25570d17b169ba42ebabcb", 0x4d, 0x9}, {&(0x7f0000000440)="14cf2633417b43473ddd16250d18ae9ca5ccbb436ca185a5c3c8c4c7d0c5aa85cd86dc9e511464d107703dc92b6bf1cf570e182879a4be170090c6554c6fbdb19219606ce4861302607250f8632f4a50d1f4b5", 0x53}, {&(0x7f00000004c0)="cfd4953b8f3d2e15308b0b5c7629b660b0bc31daef966ec530cdadf34d2fbaf083798e11bf88dbca67924121f3431753bb93a6e70765d7acb097dc6a881cf32ed2a4c8cf8785de4038414b10295625ba19880b840df1fc9ae95b3ae467c5fe344c373dd1d3c42e7b3273a4de45ab37399f7d81b9f31367dbacc809e22b643aaf286d02bb6d268d21b22d8fbcc684837a0a0e4cfad98925f25bbcfb85a4ac48e6bc60189bcd6930b2392fb9ac29efb057987e7af448d6c2531fd9f71a5bc46427923dd91875a9790f439ed6deb0208ca0707d9c93b15109429509c20d57e56fc9d199e81b6af6da04139dc349fe440ce7581fe8b37e73f6a261", 0xf9, 0x5}], 0x2110a0, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@gid={'gid', 0x3d, r3}}]}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x8000, @loopback, 0x80000000}}, 0x24) gettid() socket$caif_stream(0x25, 0x1, 0x5) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) 17:01:35 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) dup(0xffffffffffffffff) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = dup(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) [ 520.114426] Unknown ioctl -1069525410 17:01:35 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) dup(0xffffffffffffffff) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) bind$bt_sco(r0, &(0x7f0000000080)={0x1f, {0x1, 0x3, 0x8, 0x0, 0x8, 0x42}}, 0x8) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x0, 0x14, 0x0, 0x80000001, "538bfd5ce052a2a21d0000a92b91bc336effffffff0f191b8f07892e113600"}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000200)={r2, 0x1000, 0x1}, 0x8) 17:01:35 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x5, 0x1, 0xc, 0xffffffffffff7fff, 0x5, "dd904114cd"}, 0xf, 0x1) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$KDSKBLED(r1, 0x4b65, 0x3f) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) [ 520.553354] Unknown ioctl -1069525410 17:01:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x800, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) bind$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0x2710, @hyper}, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x400000) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="fe5bf25f3f3ed6", @ANYRES16=r3, @ANYBLOB="04002bbd7000fcdbdf25040000000800020001000000140001002dbc9eb52c0e23c1c731d95ebe7bd31808000300ffff000008000300ff7f000014000100ff0100000000000000000000000000018cdf38d7a70330995bed0268b10ac241333ad0b16ed2e680b263f6a48d88dd8efc19db8701e4db118744bfa99c945d1fbdbdba1a76e188a9015a4c9946ca6010eba283dee288f4171c517095580d0f521cf06ed796868eee0fa49224223cbd31b2fdd8df559bfcaed1850f31a5b892ebb3e58447dab0d52572dfbbca2bde0aaf1cccd7d2da915c9bcd157e46728c5ff61ca2c83ade3d65fb65962804a6776ae067dd8dbc345170de2ff7d3db20a33a867cacfbaaba56b78c961ae6f3b7844f86dc677bf956f83ccf2ac6ae4490e5a18e0620e287ad469eae1a5fcb0fe92563a75d0ea96fbe44e16abf7137b6372aa8418349788d9e982c0870aa4a8b42fe"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000800)={&(0x7f00000001c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x78, r3, 0x122, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2b}}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x2]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x101}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x200, 0xce, 0x81]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x9, 0xe609, 0x80000000, 0xff, 0xfffffffffffffff9]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8000}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0xa, 0x0, 0x0, "538bfd5ce052a2a21d40dba90e26bc336efee3b5cf0f191b8f07892e113600"}) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000380)=""/254) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000008c0)={@in6={{0xa, 0x4e20, 0xceb, @ipv4={[], [], @empty}, 0x551}}, 0x0, 0xfffffffffffffffe, 0x0, "ecb157d33cd133b36941b0231b073849be2d404cf60f041a497c3b2a0972e347210b84820b9b669e4a0187dcd82789e0a60b3fea0f525721830bdb722023b46dbe3760c29bf602403be8c476194e017c"}, 0xd8) linkat(r1, &(0x7f0000000300)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00', 0x1000) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101000) r4 = semget(0x2, 0x3, 0x2) semctl$GETNCNT(r4, 0x3, 0xe, &(0x7f0000000840)=""/93) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000680)={'filter\x00', 0x7d, "3e245372d1e5023ffacea5a2742ad938275ff0ea571d60f98d9711ddb9d1333807c1eaf30aef90404289e7ca197076c845af2eda6d014d7ca493d0c7221605c9325163aad8921ace53045672ffef8d2ae02c107050bcd990f73509fadeca346f78180998f78b54be651191b498b65587b7be875a6c8f701e62c1c0fc58"}, &(0x7f0000000480)=0xa1) [ 520.639610] Unknown ioctl 19586 [ 520.646169] Unknown ioctl 19586 [ 520.649987] Unknown ioctl 19586 [ 520.699434] Unknown ioctl 19301 17:01:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0xffffff1f}, {&(0x7f0000000b80)="1745f3435fa9cc97ba5976108a59ddf5449dc9c1747932945fe935920cebf99705f4dd1ca38e8d4b314fb65478b7ff6fc9b58652", 0x34}], 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xe212, 0x0) 17:01:35 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:35 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:35 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:36 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) [ 520.967933] Unknown ioctl -1069525410 [ 520.972077] Unknown ioctl 19586 [ 520.975582] Unknown ioctl 19586 [ 520.975799] Unknown ioctl 19586 [ 521.028077] Unknown ioctl 19301 17:01:36 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:36 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:36 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) 17:01:36 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:36 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) [ 521.560286] Unknown ioctl -1069525410 17:01:36 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) 17:01:36 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:36 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 521.929427] Unknown ioctl -1069525410 17:01:37 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x33, 0x2, @thr={&(0x7f0000000080)="5127a8134bd01e6a1807c789bd257a051ed10dda31f5a3ee193860857d4d0d2e9633502c7ad1a28294f43bd61852d5bc5a129f82cd14aaea798e71db5e097d1dff064466ff2c9a6dd2bdd7c4ce253a625341e81d32c46590f4d545c2dfaf967f5a3be7bd514a6e441f388c754c2e273a7dd10c58ee2a15ebf98f80f02cc42b50edb9973987da46fba80409f3d0449e4a10b5f44b375371716546977192ca637ba5a0f642666706396c0a0a82", &(0x7f0000000380)="b95130e765b89a475c9f2eefe409036ca24d6fb9707e32724ee968bde5a21eb7bfb2996fd8b2b0f19dbfb477a22a47bc287a099ea62105766750b622c9e562f6cdbeb2bb5fb8cd816a3321e209574ced345e501818a4de9af1f647c4976ff52c6eb9a90d18dd1d69078582fea28dd0c33e4e1c"}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x10000000004, &(0x7f0000000000)={{}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) syz_open_dev$radio(0xffffffffffffffff, 0x1, 0x2) 17:01:37 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) 17:01:37 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x100, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xffffffffffffffc0) 17:01:37 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x80000) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:37 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:38 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x5, 0x1, 0xc, 0xffffffffffff7fff, 0x5, "dd904114cd"}, 0xf, 0x1) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$KDSKBLED(r1, 0x4b65, 0x3f) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) [ 523.301834] Unknown ioctl 19586 [ 523.313266] Unknown ioctl 19586 [ 523.323553] Unknown ioctl 19586 [ 523.396966] Unknown ioctl 19301 17:01:38 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:38 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 523.935205] Unknown ioctl -1069525410 17:01:39 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:39 executing program 0: timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x9}}, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001ec0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) readv(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = epoll_create1(0x0) r3 = syz_open_pts(r1, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000018c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) r13 = fcntl$getown(r2, 0x9) r14 = getuid() r15 = getgid() r16 = gettid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001ac0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000001bc0)=0xe8) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000001dc0)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000440)="bb2d3a12b143338b0933486ade966a4c553f7ca6cd2925b6f7879333222131497500a963415015f8fa0c2efb9fa3ed44e78211afe683d7a829ee73fe827fb8dc7acac128a31165057e3a1d4eabf2412e9e251463c37ae68205c7d9956598679d1f2ea8daa8f1b92d8d290a915ebd1f6608140b10c28718a06db77f715657e91e53bd390bf2430c6afb747ce05f35b7d3ac7265d92de2a2918137615f5c66c1af03583fb231a6d214c2db249ae6f8d4ea912afa9cca2a5d750e3a8f0b4e5ee70709f0d08c49be70ed7ff7b53998958db60edd6aecc7bde0d8a1473ff95fceb67b9bc456756aff6d6fd3", 0xe9}, {&(0x7f0000000540)="fc5bbae34ad4cb8458aaab08735dd9f67bb2b769c89ecd3512259667edda7ee74e222c374e74c8826f5172226f1236b40d2b0524bdd471eff5b692e39c9aa54af3d4bba12228b19b0101058d9b2453ea2419ad8cea09878716363af9710e5069cc4132743b32984392d732480ed5870b820a4259474203ae55bac2aa1974bd05031e4174b6fc4b12e12e74b7d01af9cdcfadda3581ca9f209c641ec4f79696a7333840799ceb469e3868793d39eca0ce2902d06ecbbbd34a4c21ba0a476bf0a89f5171a387bf", 0xc6}, {&(0x7f0000000640)="97aa3ef9d934c3e83f26b800fefe697c091297a7726350c11b852b6f72607fa478e2cd178a9990dfccc033073c21d200e763b9308486a6b4ca6b0f8fb388298aa6fd7a6d33f30159feceb219810d010c88f706e8e82cdca19afe56eee6a26c6d732f41ef", 0x64}, {&(0x7f00000006c0)="a3f8d81c77254f8cd2c7038c9d3d2117b1f18d429fec43c8585c9730fbc44cef4fe2d45718340ff6007103d09c2d246001979fe4f21ae23f1474a21473e5a422651c2aeda175454a86c5623c7b564065a1ed579899c3e9d0d87a71b932aca8e0273568b77560608d62f7266ec3ff169871bcf2c1b7927985a3740c48b36a951826eb14ba445e13eab09e6df877573b4cc06a316e94df", 0x96}, {&(0x7f0000000780)="32a3c0d22100554007ef90d22f993f0a1dc53767036a938108a62ecd0c0ec1f095aa804e26e4baa7ab3ad8e9a87d53c2b0e3de41946af8c697a06ca66d154eb4a378e5f092e4e30c767a6f68cf66b9d05cbbc05592cedaf92ee860dc131dd72b6afd064077f37b3b89a10746be73eb2ade60af38a43ad02c31aee6fae111174ab29fa4d4dd3780e5686c2906f662adc7c5cb6b9f588a494b0ac51f2be3b968a1ab7a762d7524a013b9006882c04ff464abdc90eff2ccf344915479616af8b49bf8e8d24e", 0xc4}, {&(0x7f0000000880)="91a711156c0bb2df876a5d0d54d7f79bb5e3d68adf26fc618e6885c19216ea3bb21e49ddca3e1a90bcdd6d7d5604d4625a586050eddca1a6c1e2e67bcdff62be5603c478b1978e745186ddbd3590", 0x4e}], 0x6, &(0x7f0000000b80)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}], 0x20, 0x8000}, {&(0x7f0000000bc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000c40)="b4998a56b7191fe6e95edb7c9ae13e02a479a3c7b597c0b51179a73e18640dab7839d1351a9dec64b6231bb311feae6bd0295a83ec4a5178fbdc8e1fec54c540399e9259e34719bcdea139e5c5f099b1625f5a52c63b110fef4f252dbd6894eccb90278970eb1daecb9eb1f7ca7c9e8586106fc9bc3f1feab001b0d30a3b1f9b59d1a1c7467d893aefbfef1dfcd3913821efb777ecd252023bf7ad", 0x9b}, {&(0x7f0000000d00)="5ef2e162", 0x4}, {&(0x7f0000000d40)="7e844601c63226276c241f62d20e6504abae9c5d3c9a6866efc2400f69dd704f3adc38f006edaba47293ed999569fa42f6341df5ba72f1d01e31", 0x3a}], 0x3, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18, 0x4040050}, {&(0x7f0000000e00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000e80)="95133080e152367a8b240eec31c83ef2e716b203b8041ed7bfc04eb3f66d9c6d2f8bbe50ca5d5d6f61d1989eb9f7fb00c947ecec0ca4cafbb13d590b23396a68b477945c620d3e8f63c5c0e0cb4348f0490f8595cc6d6c5212307a98f1bf11112fed9ff2d952d58d4fdd1956adc311589bc9442570cbf7b6a19a04", 0x7b}, {&(0x7f0000000f00)="c8417d1b43596348f0af25ab48f0a6645d9bd0078a3ab15cea125042a866d37857bea84d08669713578aa5d3ba85fc47a1e3dae0efe1d42fee6bccd3fea86cbee7c21f55f76d14dd5cf6acbcc30869ee7af0d14dcf95e76179263210661817024f3a0cf75480af7fa4ad614011e833d503aead8cafae12e00e574d63579046d57edbda3aa40265d7c48527c2a5b632d8bb610272d065110956aafc06c99b0a7344ab71bcac05648a3e6033fde84720", 0xaf}, {&(0x7f0000000fc0)="7c892dd53599754f5786a75cce01adb63cb764b7ce6f38c692b7a88084da9cd9d76238e53c9d91720d7dc7efe0b30d9a6ae4c41f2022248672f81ad9746e59f34f32921895a1086c4e04ee93feecdb756546417ef7a5e595a3065027c360c1c7f0e8ec6db4e7343b009da7257fc650b260104129cd0a40322c0d214a9fb83d48575aaf67c0ead9929cb5c209aa2a040a78c6ac80085d9fd9887a9e9c5963886461a4db07ddde9a9b15976dc5b83df9b6106da6a136aea7f6af6cff260834ff22cc", 0xc1}, {&(0x7f00000010c0)="37276b77ff637c0995b204070c9f6e12a9381b8ddc94651ec36dfcea00f99c7710cadc6f33c320e2519b3faa2442813a428258918635f7cf89b617b63f5e55416e5fcc35", 0x44}, {&(0x7f0000001140)="a2ba11f336f2d3973982338d7957faf0dc34e7f801df711dd8bdfd9336f39752f3c7945631ec07e31a3772181c961b6af9b81ea5f4b01ce77c243ff9e446c0ac104610db887f0e825d76f310693de7a3a78af9eca5bd52324e22c1a196d2fc1174612dc8753f84444e7af2769700c07e7368c8b699c1e6a60e96395d5263a6a61209b1c96d36f74c89ba95782970b60c70cdbb829fd3bcec1c4b001441748d224a4c22a5057fa4fe3f4fcd8dbf475e87142916d8c9bd9aa757fd21c1f83958d2d39e5ff3a770d4abb1578fb2114ab9e878503795dee8fb80424197a4e760da3cd1dcaa301c3ff767b1546dc1882cf7cc89d0", 0xf2}, {&(0x7f0000001240)="f7f4d7699bbca88aa1ed4e0ed2d8f024ae", 0x11}], 0x6, 0x0, 0x0, 0x40}, {&(0x7f0000001300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f0000001380)="a281a919908bdbdcaf8a37b1b3c3d33b847383af8282bbf8994d84cb83f659a3bc6df4238e1c152260b7756cfcca17b15d224c06629f2de12f08cd335ed15811ace3b8f6eb4367f0e54371a938b0295d210901be5a88334e7a7d954ffd07a0d8776a81ec0b658415c7b05e267562217e8606c630bbbfd04b7d7f1a8162a4199fc810e22bc302c62e5e490a5ca831e8e5143ae3c23095b747c4b4e6ab0dea95ee6c11b32684088d5def8307da7ac839daffc374623d54ed065aa2728bdba84b02203c6b", 0xc3}, {&(0x7f0000001480)="4fc60dc393a254410da5957c89a0e0702c62fe779635650e91c11bfe448fef08d61f", 0x22}, {&(0x7f00000014c0)="c7ca819c7e9e950e1743b258f7a1135643d1fbbc69c7d8162d2c8b0b91f1afced87cc5cc4031b42be2351e687042cd4ea5ae9dc3ccd8fb844e8bf1b67f197b9e200b2e1a9c25f7b0767b1fa34a1a30412b84b30a76079f90acd397337ed4d2c2de2794c42ca8e566ec84659a62e0c17859a139909a7bf9c7fe52907bcaa06d452aa62ef4a8", 0x85}, {&(0x7f0000001580)="f40428fca07fc0697dcc6a133e66032a052a9f0691f88dc52a5dea2328222586d53c2d40add106d404494eee3a18625da464c767b4593916147382291a33bb8ca59c1b094edb62eccf91148a1f800d5aaebf8fb794ac6dab235549de434fa9f701145a9205d27d904f24f414c991b1c789b421e5b98449c3b8da6b8e36bf5a4e121caf5035a7ade79b9f933f3625f5932fd83becb0c974b2b637796c9114792fa5", 0xa1}, {&(0x7f0000001640)="c57a6aff066d5aadc8c074f6c2861c7e43ac14a9f9d5caddba338950f10f141dae4ba24c6aac1c260f748e926c1f06c1919928031a1ba8629e550d60a4b8020dd9b7fa497f9ec75866ae51fff6775f4149ed18732b1c7474140efea949810d8915182539c821ffd2b115afb53011194b5d58f42d6648e31c7060b20a8ca557813599c5c123fcb5fbcf0cdb1b7218a41d25f142af0cb472ab0f431a21b72d9716e231ef88131c145ba185b4a7980b2130d1fe3a896231b3921026473e166d8fdb3414c6ef0dc86fe9a75332d5bb03da88f04edcd939", 0xd5}, {&(0x7f0000001740)="29047474f81e6c69a96e6bf4d1a37059fb487280d21baa0c40b8af886164d96e3ffa9a58d083c64247533c008e5e827b8cce801461c72e04e2880e0c54477b0042444914d733b37e7dba42490e08678cf9b9781840fae634b76cd06916ec489ac4a582a6d51f77fd63a5ef6bd416d81129766b3a8d2fc393fe8886d2c6446b088a1bd9343415dfd084163bbd22c9e0414d10924d343a388ca290b74545f63b9cf7a8c526314fb464658e991fb11952592310f15edd24d9d656075ca4e8b8c1e1a4b572c79fd7b306fee76a9b5145440d26090a197348a962b7", 0xd9}], 0x6, &(0x7f0000001cc0)=[@rights={{0x2c, 0x1, 0x1, [r5, r1, r5, r5, r3, r4, r2]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x1c, 0x1, 0x1, [r3, r5, r4]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @rights={{0x24, 0x1, 0x1, [r1, r3, r3, r5, r2]}}, @rights={{0x28, 0x1, 0x1, [r5, r1, r2, r5, r1, r1]}}], 0x100}], 0x4, 0x4) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) dup(r19) ioctl$sock_FIOGETOWN(r19, 0x8903, &(0x7f0000000080)=0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000100)={0x2, r20}) r21 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r21, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) [ 524.408575] Unknown ioctl -1069525410 17:01:39 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:39 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r3, @ANYBLOB="000228bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r5, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x3, &(0x7f0000000540)=[{&(0x7f0000000100)="df32b28d5051dc42b011288ff6b4693fff19fcf3175b96", 0x17, 0x2d2}, {&(0x7f0000000380)="d1be7bdc8a3f3a2e14c2d2c6e956b9c60b6519a4bfce0038e8b552ab1dddf2c038a9ba9884fdee02f4bca3e7e84c20b506697a9ca6309595337f8b0cad184671d66951b16b999c7caf6f10415d6c243e1ff5f7222c07b0cd08fe1e358a6bb6a73b6f6eb4a40d28c5c0e419fd0b818504444b82b33953de3e228549066904f235", 0x80, 0xffffffff}, {&(0x7f0000000440)="92e5bed3daa6dffc8bd38becb5d0e2186a7a5b1209364453537b03d8e50426c90e37a7b807d848cfe8121d75dcd5bb2135791212e8cf6ecf11ddbfe1cf3cfa79a054edefa07e427d1052a9aff30d3afce0f0932b1051bd3573ebedf966c9146ba5671a6afec5db73303b14231720aeb89b43692ae87e1ecf9d132ed47d5f98070869af72e78ed30d744f3222cf3576ca0b6a98ec1ba66e2a70f4b2c470e852920cc6440afb02cb968eb1163c6cb6afe4987116ae8823d3bb0550e438f876daa35a8896262061f0d38db9c8cb9adbad38c5a337ea", 0xd4, 0x9}], 0x220400, &(0x7f0000000140)={[{@nodots='nodots'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@fat=@check_normal='check=normal'}, {@dots='dots'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}]}) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/204, 0xcc) [ 524.666394] Unknown ioctl -1069525410 17:01:39 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) 17:01:39 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x3, 0x100, 0x3, {0x5184, 0xffffffffffffa1b5, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="40b633f757b5a1632cffbea08697f1cc96ad87fd504ae864ee619c5f", 0x1c, 0xfffffffffffffff8) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/204, 0xcc) 17:01:40 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:40 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000440)={0xea, {{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, [{{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @rand_addr=0x47}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/204, 0xcc) 17:01:40 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_pts(r0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x40000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x5, 0x12001}) 17:01:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a376dd1b19517d9a8e431f2d6029af8860d674c22604e1ee78d91af0fabfa6f3f6b98c9e3272", 0x26}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r3, 0x0, 0xe212, 0x0) [ 525.121216] kasan: CONFIG_KASAN_INLINE enabled [ 525.126204] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 525.138041] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 525.144337] Modules linked in: [ 525.147692] CPU: 1 PID: 21264 Comm: blkid Not tainted 4.14.136 #32 [ 525.153984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.163319] task: ffff8880903a6740 task.stack: ffff88805cf70000 [ 525.169378] RIP: 0010:kobject_uevent_env+0xa1/0xc23 [ 525.174380] RSP: 0018:ffff88805cf77b60 EFLAGS: 00010286 [ 525.179722] RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 1ffff11012074df6 [ 525.186977] RDX: 0000000000000014 RSI: 0000000000000002 RDI: ffffffff87078950 [ 525.194230] RBP: ffff88805cf77be0 R08: ffff8880903a6740 R09: 0000000000000003 [ 525.201480] R10: 0000000000000000 R11: ffff8880903a6740 R12: 00000000000000a0 [ 525.208734] R13: 0000000000000002 R14: ffff88803bd97100 R15: 00000000000000a0 [ 525.216004] FS: 00007fb4a6730740(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 525.224212] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 525.230095] CR2: 00007f32cf349028 CR3: 0000000097614000 CR4: 00000000001406e0 [ 525.237434] Call Trace: [ 525.240014] ? lock_downgrade+0x6e0/0x6e0 [ 525.244157] kobject_uevent+0x20/0x26 [ 525.248201] loop_clr_fd+0x4a7/0xae0 [ 525.251903] lo_release+0x112/0x1b0 [ 525.255524] ? loop_clr_fd+0xae0/0xae0 [ 525.259404] __blkdev_put+0x434/0x7f0 [ 525.263190] ? bd_set_size+0xb0/0xb0 [ 525.274054] ? wait_for_completion+0x420/0x420 [ 525.278618] blkdev_put+0x88/0x510 [ 525.282157] ? fcntl_setlk+0xb90/0xb90 [ 525.286028] ? blkdev_put+0x510/0x510 [ 525.289894] blkdev_close+0x8b/0xb0 [ 525.293504] __fput+0x275/0x7a0 [ 525.296764] ____fput+0x16/0x20 [ 525.300050] task_work_run+0x114/0x190 [ 525.304104] exit_to_usermode_loop+0x1da/0x220 [ 525.308669] do_syscall_64+0x4bc/0x640 [ 525.312561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 525.317388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 525.322564] RIP: 0033:0x7fb4a60382b0 [ 525.326251] RSP: 002b:00007ffc269f3268 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 525.333956] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb4a60382b0 [ 525.341209] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 525.348640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 525.355906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001273030 [ 525.363156] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 525.370408] Code: fa 83 e2 07 38 d0 7f 09 84 c0 74 05 e8 2f 5e 6f fb 41 80 4f 3c 08 e8 65 b1 45 fb 4c 89 fa b8 ff ff 37 00 48 c1 ea 03 48 c1 e0 2a <80> 3c 02 00 74 08 4c 89 ff e8 c7 5d 6f fb 49 8b 37 48 c7 c1 40 [ 525.389501] RIP: kobject_uevent_env+0xa1/0xc23 RSP: ffff88805cf77b60 [ 525.396972] Unknown ioctl -1069525410 [ 525.403122] ---[ end trace 69863381a012b973 ]--- [ 525.407906] Kernel panic - not syncing: Fatal exception [ 525.414166] Kernel Offset: disabled [ 525.417788] Rebooting in 86400 seconds..