[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 30.011091] kauditd_printk_skb: 7 callbacks suppressed [ 30.011103] audit: type=1800 audit(1542106261.859:29): pid=5879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 30.046425] audit: type=1800 audit(1542106261.859:30): pid=5879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.43' (ECDSA) to the list of known hosts. 2018/11/13 10:51:16 fuzzer started 2018/11/13 10:51:18 dialing manager at 10.128.0.26:41013 2018/11/13 10:51:18 syscalls: 1 2018/11/13 10:51:18 code coverage: enabled 2018/11/13 10:51:18 comparison tracing: enabled 2018/11/13 10:51:18 setuid sandbox: enabled 2018/11/13 10:51:18 namespace sandbox: enabled 2018/11/13 10:51:18 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/13 10:51:18 fault injection: enabled 2018/11/13 10:51:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/13 10:51:18 net packed injection: enabled 2018/11/13 10:51:18 net device setup: enabled 10:54:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x80000000, 0x6, 0x2, 0x8, 0x5, 0x5, 0x5], 0x7, 0x10001, 0x6, 0x7f, 0x8, 0x2, {0x81, 0x800, 0x0, 0x0, 0x5, 0x7ff, 0x0, 0x3, 0x2, 0x8, 0x7, 0x0, 0x9, 0x4, "1404ef1648191ebbdeb8fbfbaa5d83cc53c616e470ec18020ca7af8401569395"}}) r1 = syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x2, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000140)={0x9, 0x10000, 0x100000000, @local, 'rose0\x00'}) sendmsg$alg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="45390bde1ebace77d729cdb5a97529e17350a4ffeb3cd073a4fb69c944928613cfd9207338a0d41ce1c6d5040ff1b54c4032c432b07aeb63d398300f6ea909409f672cf43ae564d1fb64c216df7958b2ad1100cd15fab7e721c89714356ce7f388770a509d04910ea6fbad71ff", 0x6d}, {&(0x7f0000000200)="1851a11ded8a1c094657c0138c254a1be238a59fdd1337ed8be59d26978e3663e4fb22f0ce5163f97f9d9204e0279f0d919a02a77998b1b24db550c9de53b715fc97990c88b7bf6e06f19681e5e34072d87757229cc3ff522c744089464294e10802c7daf4a355c379a0c9febc269eac575c4d80956ddee823d9252b566cc1e2842e7ffec957b2e5549c2460", 0x8c}, {&(0x7f00000002c0)="e72bb2202ea129c7a3c665d6e475bcc27b72c1d785871d74b4578a1d2153e9440af066c9b2de1278e307960a9a63f0b063d9a5a8adcdb8690804fd9c8c132bc5ddc37a2e75ae49c0ee5f9fea48db6cd2068b4214c0e15e789a9dd42cc9cf498e81e29600c7bd59340ffd3711477060fb617f8e70b551306c589eab193ea216b91b53b69f115280c91b0be740efa6d4a18be983c60f58668803bcdbe70ecd7f22f6ddd52e61c654c6fd0405e3d471b48c9f6871cca26db154e00170df00579a64e2647735bc1a660e93ebb27c85ec00a0972b2698d6a84843248307d441b788807be24c08c140007212f04efa5469007c25f49e391ee8", 0xf6}, {&(0x7f00000003c0)="4168d5f4607ff8a4283125c22d7611f8efa06d6b887d18110162043659803ecc92dcadf003319b7b766e6b350953703aca3bfb0a3a56f5ecb974671f4674126fc66235deed4ea54e838083e9fc800cf23b27081084d80f1950c207e5ec29aa043450dfa68a13d9", 0x67}], 0x4, &(0x7f0000000480)=[@assoc={0x18, 0x117, 0x4, 0x100}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x86, "95eb048eccd80b660055daf674cb3aa002a956264c4d1f73b0282f5762f94e18e94f8c3de49db43cf7ae99af1540f2157800f4bd3784687ff1c6872632cf08dea2435c7d3ce8c69c1a184159a8151672c26aa7fec0fadbaee2dfc746267d3405952347367054ebabc508aa361c83cfd0c675e9e035ce09212e6ccfedeb6476043cd713a4f9f2"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x100}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getgroups(0x3, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) write$FUSE_ENTRY(r0, &(0x7f0000000740)={0x90, 0x0, 0x6, {0x0, 0x0, 0x6, 0x2, 0xc39, 0x8000, {0x3, 0x4, 0x4, 0x3ff, 0x100000000, 0xd8e, 0x9, 0xa14a, 0x100000000, 0x7, 0x6, r2, r3, 0x80000001, 0x5}}}, 0x90) r5 = syz_open_dev$admmidi(&(0x7f0000000800)='/dev/admmidi#\x00', 0x8, 0x2000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000008c0)={0x0, 0x9b, "6cdd4cc2050695df1fdc72e4f2aaf030fcebf1e4c939a566032bd9a1fef89357c59008a8767e8b99b2640a7aa14dfc92894fadfaf86d717e57158780cfc9650a0d53f0601a1721302ee93d7d567314141d7cb314f4f08700895f4b720739d5e8a3b8adfdf6eb8125deeb1b8d9e9d1fe1ed0b4452595ba2c5acc352a75500fccb10ecaa8cc19dd0a74a284e80604c17fb3886fec806ba444d26fcc1"}, &(0x7f0000000980)=0xa3) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f00000009c0)={r6, 0x7fffffff}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000a00)='rose0\x00', r0}, 0x10) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000ac0)={0x20, 0x7fff, 0x8, [], &(0x7f0000000a80)=0x4}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000b00)={0x2, {{0xa, 0x4e23, 0x8, @mcast1, 0x5}}}, 0x88) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xa0010, r5, 0x180000000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000bc0)=0x9) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000c00)) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000c40)=""/90, &(0x7f0000000cc0)=0x5a) read(r1, &(0x7f0000000d00)=""/107, 0x6b) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000dc0)={0xd, 0x9, {0x56, 0xffffffff, 0x5, {0x3, 0x1}, {0x0, 0x1}, @ramp={0x9, 0x4, {0x0, 0x5, 0xfffffffffffffff9}}}, {0x57, 0x4, 0x6, {0x80, 0xffffffffffffc22c}, {0x7ff, 0x1}, @period={0x58, 0x71a, 0x1, 0xfffffffffffffffd, 0x7439, {0x0, 0xb2b, 0xfffffffffffffffd, 0x4}, 0x9, &(0x7f0000000d80)=[0x8, 0x101, 0x9, 0xffffffffffffffff, 0x2, 0x1, 0x1ff, 0x6, 0xf969]}}}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000e40)) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000e80)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) mount$fuseblk(&(0x7f0000000ec0)='/dev/loop0\x00', &(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)='fuseblk\x00', 0x4, &(0x7f0000000f80)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fsmagic={'fsmagic', 0x3d, 0xc1f}}, {@subj_role={'subj_role'}}, {@audit='audit'}, {@dont_measure='dont_measure'}]}}) getsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000001100)={@rand_addr, @dev}, &(0x7f0000001140)=0xc) ioctl$SG_GET_VERSION_NUM(r5, 0x2282, &(0x7f0000001180)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000011c0)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) ioctl$PPPIOCSFLAGS(r5, 0x40047459, &(0x7f0000001200)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x9, 0x3, &(0x7f0000001240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000001280)='syzkaller\x00', 0x8, 0x7b, &(0x7f00000012c0)=""/123, 0x41f00, 0x1, [], 0x0, 0x6}, 0x48) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000013c0)={{{@in6=@local, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) syzkaller login: [ 242.925174] IPVS: ftp: loaded support on port[0] = 21 10:54:34 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x40) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x46, "b64e17e9577c55a533875ec58d3216e414e4fe0d929f85939cc3228ae842d243c6ca89ae7e443c532f07a3f23708545a32454ed4ea5694e0458c3f7103acd71593f231bf66be"}, &(0x7f00000000c0)=0x4e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x2}, &(0x7f0000000140)=0x8) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000180)) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) r2 = getpid() capset(&(0x7f00000001c0)={0x19980330, r2}, &(0x7f0000000200)={0x6, 0xa8, 0x0, 0x22, 0x6, 0x8}) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000240)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000002c0)={0x80000000}) bind$unix(r0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e23}, 0x6e) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000380)={0x1, 0x80, 0x2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0xfffffffffffffffe, 0x8}, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000400)={0x0, 0x10000, 0x4, 0xffff}, 0x10) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video36\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000700)={&(0x7f0000000540)=@delqdisc={0x1ac, 0x25, 0x22, 0x70bd28, 0x25dfdbff, {0x0, r4, {0xa, 0xd}, {0xfff3}, {0xfff3, 0x4}}, [@TCA_STAB={0xb8, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x8, 0x3, 0xe3, 0xfd, 0x1, 0x67, 0x6, 0x1}}, @TCA_STAB_BASE={0x1c, 0x1, {0xa4ae, 0x2, 0x1, 0xd8, 0x1, 0x3, 0x0, 0x8}}, @TCA_STAB_DATA={0x10, 0x2, [0x7, 0x2, 0x6, 0x8, 0xffffffff]}, @TCA_STAB_BASE={0x1c, 0x1, {0x0, 0x6, 0x7, 0x7ff, 0x1, 0x6, 0x4, 0x4}}, @TCA_STAB_DATA={0xc, 0x2, [0x8, 0x2, 0xb6, 0x8]}, @TCA_STAB_BASE={0x1c, 0x1, {0xfff, 0x7, 0x2, 0xe7a, 0x0, 0x7, 0x800, 0x4}}, @TCA_STAB_DATA={0x10, 0x2, [0x27f, 0x370e, 0x0, 0x8, 0x1]}, @TCA_STAB_DATA={0x18, 0x2, [0x3ff, 0x7, 0x800, 0x7, 0xd4, 0x8, 0xffffffff, 0x1, 0x101]}]}, @TCA_STAB={0x3c, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x8, 0x0, 0x100, 0x7, 0x3, 0x6, 0xff, 0x6}}, @TCA_STAB_BASE={0x1c, 0x1, {0x10001, 0x7fffffff, 0x7f, 0x52, 0x1, 0x2e, 0x81, 0x4}}]}, @TCA_STAB={0x84, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x7, 0x5, 0x0, 0xfffffffffffffffd, 0x1, 0x10000, 0x5, 0x7}}, @TCA_STAB_DATA={0x10, 0x2, [0xf485, 0x100000000, 0x0, 0x2fe, 0xfffffffffffffffb, 0x3]}, @TCA_STAB_BASE={0x1c, 0x1, {0xbd, 0x40, 0x1, 0x100, 0x0, 0xfffffffffffffffd, 0x9, 0x9}}, @TCA_STAB_BASE={0x1c, 0x1, {0x0, 0x8c5, 0x3, 0xfffffffffffff173, 0x0, 0x66, 0x800, 0xa}}, @TCA_STAB_BASE={0x1c, 0x1, {0x9, 0x7fff, 0xe69, 0x5, 0x0, 0x80000001, 0x1, 0x1}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xb99}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x10000}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x800}, 0x4040804) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000840), &(0x7f00000008c0)=0x60) r5 = creat(&(0x7f0000000900)='./file0\x00', 0x10) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000940)=0x7, 0x4) ptrace$peekuser(0x3, r2, 0x7) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000980)=0x12, 0x4) r6 = accept4$nfc_llcp(r0, &(0x7f00000009c0), &(0x7f0000000a40)=0x60, 0x800) lsetxattr$trusted_overlay_origin(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='trusted.overlay.origin\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000b40)={r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x9f3, 0x0, 0x3fff800000000000, 0x3f, 0x80}, 0x98) r7 = dup3(r6, r5, 0x80000) ptrace$setregs(0xf, r2, 0x401, &(0x7f0000000c00)="f712626e4401eb756508c09f7a2aafa8dfa6fb03390c8604b4b35404d8ec8b5630ec63d6a1003340d8a698701165f3652ab585413c4632fe07a89da21662933d550c020c819be9b2ee93703b0ab064949635a47cd6bfb59b55722da5cf439fd1b36a58b3e8a4b9d1957726ddbbf0f80abf4930297d7e65dbde3a7c86695d439e5f0866668e709e8378b00e0746d91025ded48137a8a087ec2b1387463319ac36582fd42f1081e52f59f32707ce245f25b4b51638c1a74a067057ad7b86214585f5908dd2b12fb1bddbda73ff0609eb9defc57991210e88019a2626a96676d11d109a6425d494168dfa57b4400cf971c73885671fd4d1d765d4ba6f2e1b9d0126d98fd923ec89b3db518700f1ef78ddce6f48f71ddf75841ffde01444fc5b910494994835c135a6f2db99975e9b3af3f983771eacb84585ff93cb1b76ad463e6e8fb65771cce1347cf2a8e9097750c70aae9eb1a4ff4147de0503b7872f1bb600d369c354fc790b71f5a1a12e5c116fa840c9a48b01806d574f4d518fbe5a953ab71bf2005e669b5e27c1fab7390369a0e69af1ae9bf65a56d6c906ce49e887ae26c87f04ad8fbc417e90f2148c71923044a41c2fb2f7831c27454b0fee312bcc301cafe30f660eec6882d70f0b44bccbb18e2e2b3f695e7c6f85ff825df77aade4bf7cd05a97cd92344fca432f3c78c2395b3ea14231b5e444026b7380fbb23f633d756f9922ebf986992bf2e0c4e764abd8ede80f2603e5e0b8695b94d7fe2df82cd5052e32dfb4368109ca8b56a2bb2a56455b585ccfc4f3ac5b0801143847c212e5426a45afe8511dd777a6c286dc4c9f940a73f50f33c35835c75c9d98bf1c110df6a6eab7ade6c5a231b2dec396a6ce6dfd61837ebf2449a5791ae768a094a3a0468c34c045fee8bd62f5b2c0bff03d5d2e479165a306c5631119cc41beace9a6724985a849ea4604107eae7d1ee4ca4456c3632b11b3ac36c2572b42459a9c5705d46bc919934e220600e63beb1561462c617441ec26e408406d4ee31bd417f4bd9bdeecd62d7e8d455b6e1d588165f72571e183f8a6bc95fd5ddc72d0f20e8a4e2327600fd76c093997df2166f479753716e4295b503315b2132549ddf539aa9e17c0e3debf53b76f648074edf372bef714b63379da5c2a70405c73b2558e7b19f06eeaca1ca7ec680273db70cd2a31b91341aa83a2c04cf214a8e85f6b26c2819327d160bbc34925403a6b0707142eec6b2b0ab48dfb0a9f8c43e3572fef042f3207755a59bba740b30ee0eb17b250588c11345311195e6ba93321507648af290f7b0e584befcedb61e1d7ef5d5e8ea5b49163ad4ca1ce342b35af5088a81f41cfcfd420b254da93d3c7d4820e3e28588541c31967e5dde1619521f3070761a493fcd268ae209b4143d6efcab6c5c590b3f634c2a0334cd72de31c4421016aa5b42d22028998d1226ff00cb7740e3d3d46a7448854237bf86bc3ac5283a45d859d25d191dd284220f6d0f1fb6c2464ea07753c5363bfd61467de2d58ac7042188ee14868c9a5a05aacb81fad0d9430be4ba5522ecc871b6d64b4b33fae429acbdcfe3b301dceb22cb7fc0d9437580ed2a7960cb118241fdefc3e686433dd1a5c1f4bdf403696c595f52efe0dae744a5c8b02cb6806b5c4a955eb55a3fdfdf5bb9d3bf98571e991052d2f0f6def0a52231f1faed1b081b62b78f9a1f3006a5434906b3e4a73efd28013efcb561ff5a580c44e8ff86a58cef57a3b686826ae85b48d4587c1012548d293225412306436a936f9a0d92e1231b50e84959bb35c380f155b3f1e09a543ca85ab02010e66572e08e03fd6aebf5b294eb135a654cc1312a80fc1d8d677297cdfa6afc2b3c9d1bef9df11f776e669af6fdaecc51261e100c9f44c6ad1f10432838437afbea496b3fa12d9ef255fa3fe361f8811bb97e253e6abb52a9ad6c0b34d861ba7b9237ab0b0055a8c633380c65200da03cde2f625928b75cc05d094835e702b5cd6f2d42e1353c5ba9c610706f269e1549c2a8e3acb75cce810f31ec61d315c22cd2fb608fd48be9c45bddba5ad168e7b93b28ce64af1806995faa6f765e401a8082f57c0609a20cc457d8e5fc4f647fb452425d88839a8e9b4129981035b27801b770711c5c19999db5f90f106b472cb5adf8d46244451ecc8fced9396e574f3fa4102eca178098cbfd7d96fff35fb8aa92ea727fddd00f22b88522ff1223444e57c2599536c2828beb4588b110199b6ca156e64bbcc48c0181228ac865ea4a28ad8f194f6fdb6ed9d1ec83215a0c858b1284a4be11d146387f68212ee42d7fd20f9d428fb2b33094d16cf2c76f9d99e4c16a817d6819738b4a653779643fb462732cdfe9bcfded98bdbe5fb628cc9d8cc180a620f5cbb8f603dbbb3be1116efe8cce9d9e01ea4986f2b60827bd0700b6567fb92073879dc6af7ea92a2bbaac6d3a184337d57a2998eb4d8a335cd483485228b760b3fdb56630b12848dc304f5709081b0da54a2ae9f78bcee6d58ff247d1132a54cbf460a826c64be20152262d5ad02ad66d316026d7f27658d37d9755e4e769258e0c37c7b9257ed5fcb8b1b804faf6c758dd66b4af97ecd6a598b5bf36a30b2dedb2d294d0686ebad6613ca1a01bea45e5ca676d24ac736311cfa57fec3e706f0361cc092e1e94edd18a1d7bf0856522b20f3c222e320d0c324e92bca340b7d37bc030a807792aed226bb8c681dd5a2f6e8790e1e1d55c35182090ea7093296f2e739b0ca900d68809a3b887d62cc0474e94be1ee033bf2d34723d286cb20cf8595493e6f30dead089678292edf18ab9861c4dc0feabd3c937cbf78a9cac717bff323a8692238371461291e265a519ec9d1fa78b86a1104ee6f18a020feca4c25a63cb3a1bd3eda20ca7bcc5434192fed0b5c8bc75d1212d4af90b51462944d9ee63dabfc14768d498ee0e1a4b50ed62d78ac08fa0af11ce3a6c6d03fa62738a61e778a7ee47a812991d9a7d2fa7cf67477740889def78da020316eaaa847e3e8af486e72bfdd5e1ba60ff49901af887ef9c2dc976c51e983d9a24b06663054302c131e4b751211f2f768cfa8efcd5fe960e4c1bed902a4af6cdc86a2d682906f3fa8912046cadc22f62594e6989d2994a9d4d7ce93c2230849f2edb0c7adad22894cd3d870162935aa4543cb5bf31bfab99f96553e5c55a7e135c540d7f7ee2d309a7983636153808fc2e6ab77c962e69dccaf834f1d9bc3dd39f63731bc60fb85605ab5731ed016055e006d09d8ab6bc93fabdf023fbaab90d5e0344fc6216867e7c683b1f0b5ce7f766457999512a4417fcb60d5b8ac5b91c36604302c1a1609cf0f140d8f7fdfe79c3760c056018c49cc16023ad3e8da28b657b805a0c8b6ba82f675ee9c18a2c282071cac55aeb6ffb1b6ee9a246a96f41c6d431093076841763e6eef59b0b40ef5239ab6d3a5e206975e18c9437d6b7e525c3ad8a2ac3a178932c845c4b00ac337f787617ae0ed15b57adbe77dfcf81c4e2457cd9e8e60b06967b9b7e1a03baa21b2f5071ad8ce154b6fb6f841da4d1ed50f78d6d92bd8fec3200ee8ed2f7b636e9ee2157aeed6a63eb897d926b3d6899d6aefde0dbb49204e963f90b79e35ff65b7590436314a46664f5ef065f11839d7e5cc8ed85d41b408aedbbeaf485023ba04c04dfa5f832d43f7b040ee83318df71f2f1eb05405c8e9e9ed990ccc0d85b0eac055cff6ec1181877a26127deef788bc352b0d7ca7c9fc6ed34114f3b355f50b8bd2358ed312464954880071c733789769b1faf494f3abaeca65286ef976d6c12352e7c180154a7148600b3d567bdf34c9c1ee79c359911542924a6c0f44252557b6ce1623ae201311bfd265d03c32e1a0cf44639035842839b84598a30811e72507561d88238d00d30aa06479def52719255c4a05e13496e5c80a34d1b6ed7dfe4636c38bbcbf81f9118c9d9c58e9117465a6ea2d7e375eff61b549a9fc1e84028d07a2641ef81c2901b4c0e728ec167e07b158ba96193ec0741a9a9b5d7da340bfaad316e14b5eed3813562a86e9fadcb73b288f1da7c75a12946e13f474a396f88197f2d1776c380b34d0aa477be71b7db5ca7b4c6b37fb98f628824cf8f5c50dd77846e675dc7013fbc0838836295a52f39ef5bbd8c9fb443dcff03e97d030ffc49e3513be0b8383118300bcdddaf1506dfdca4f255f7fd8dfeb24f3b240f520c27bc290709350157b2494c59bdd2bf77f85d0a5a49501aed8752753444f8ef67dfa6241eb72c35e23dc8dbf7554f8b90ebf5ffe61fcf02cba55736e018fdeeccb3f519c3f4c5f284575b224122856a0f270da15ef87c7bec19760d34f7072ef4593ffe2f913457c5eae66f7207552a11b6853ce85b1d40ba1ef6a08dae21e99e0806e0606cf37014e68b9716cf57a19eb82d1d9025947da678fba9924cc0f57a512cecdd63ea081c56bf8b15e6481a4b3cab84068b6fdf0aa6acf0ffed4eb51ae0011e29bca2860890e625a31c4839e6b182d4f95519a205c4ce33e8df77655b176cb39b28909eac86e5ce85ec6efe054c9661efdaca5904f1f08b0a69d2fc146590f4bd69f859155cee2adafe86c029c6945bfff43d565092e7a8ad027af6085539716eff81d021fa0a8a0eaad0088ea11ee0df0b6d7ebcc1d53638199a7df7a8fd5aa70aa5cfc6911d153a3cb51cc658f99e2b282dfaa9454bad74a69de25b6151efb290047992392d393b4f03fb652d6c8830a32cc8b1502b677df467ca8bfa38be0cf58bb75701bcd6030f3077ae4e562a39deb984135201fa7ef6b3bb0dd763e915bfb6ad37703e7a3aa9931b641d291052cd5a055ca6f67163561f1894618e9b05d92b8b1b19193bb267ddb9daa69972a215c3e42fb256cdffd72842d7182fa78ad8289ad7787d3cd3869aeb27d419472000d9b9e58db63d08bf4be7077469bdd8b35b8d960f9668498c21ae58bc2a57a82d2377cbad81adba375f6437be250ba9b6f57d1258db7b1b32b79a2fe7b0e6fdfeb3d5ad110de40701aadc4271f25ad197339e96eccda303d73e914dd45defa09ef823ce78e04839498eb13482820097602985bcf291a56b475615daa87bbc3902aae200e4be517e243e6bcb1b517b4f6cd90ef67a3c12cccd7ff8b681fa2eddcbf8576cbe48acff00ee0d3b93581a2f0fc14ddb6e84531cf460b2d20b88c2e1922ba2c6bd8d737131c88774940b58b197252ff033066888b87030df199e66e61329e59a11c9a6d9d4416bc1e19709dfa585d8dabb597d8d4778c70b0435bfcd2f45cf13d3120f89947c054c54b0e6ab1a08e6109518cc1340d99723b2f870494892662442f0965598314c9e59ca54145ab32c18b1c324c9f2713615ca931e50b358fb31e09cb44a82a812a19cab4c1f9e9d505c92ef83c0660fa018e8e3e225abe048908777c80cd6d34306dec90b59a8f80d80aca3cb36c009b887d8de81f4d4c67a18949b3eb7d64d6e7b0419eaabbae2dcec0b7ecd0c5e2cbd1ce9fc3086bceb95d0dba0643c573b6791a3dc9139739bbef879c372d9b41db456252183424d0a7a83171bf8f9bae6bc2433fb3b52f60bcdebf3e6b8c2853d3db4d12c4bfbde5fd6701b9a845ce0830c2b07c7ab5c71da70e756e7ccb61a5bffaa181bc0d89929a93adca5c8644102769e7efd4b7f83dc8d4f424d4cb92cafe012757513a4051f659d07167c2232696e08b24e0e5964c3bd7f4d7eb2fe33521be337cc7c69d83ed2ee7f7fb2fbe245585e35621df6895e3063af1d603ad57") dup2(r7, r3) [ 243.218162] IPVS: ftp: loaded support on port[0] = 21 10:54:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "0c1dcd3dabf367e02a91f34cb90703004d20fe52d2b33e46983f1ea92daa3297d8b18a7d187aae7bd409482f5b6f63429f1af1c6bb2241ab279a2c582ac9cf49"}, 0x44) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x6, 0x5, 0x1}}, 0x28) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) clock_getres(0x0, &(0x7f0000000140)) sendfile(r1, r1, &(0x7f0000000180), 0xff) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x6}, 0xf) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="c99fe41d844be219f6143a4a944b6dafa3103161520446ae425289b076900bca0583d57524d7d0378fa9fbc6a3ef5e94d084e83acd68de", 0x37}, {&(0x7f0000000240)="fa48c9aae04b55bcd2df83be2697046ff97d2894594f0bb19b1635fdb7eba46c9b3de9aeff000f6a92a3c375796c2192dea09646a1ed8ca3624d1e596b86b9ab20a5007e83cd53bcd32866689826728be7434fc5dc17c82c13468934fe51ff40294deb2e1046af074b95ea6aa69f669287196401b90fa42eb3372568a5b9f0630b03b60e37222ad729b225d0f7fa624b4cedec01c0b2b9055f6709e82c71dbcf8e76ebc0ad6806631cf48f701edee0dbd6f8", 0xb2}, {&(0x7f0000000300)="e2af4adf217f4dd5544d2227eefe20e2b165eed0a814b67cac35021deae1d02689952a42b522c4c219d43a47cd4bdb2655568dd3e5820de2c00d6620d0b14c92ca698047eb40d3f4ad59210ff40066c72ea85b07c38e927a44daca1495fa2dce387345b8d650d07c949b5aad0edbef0b85a95f871e112505c7342ecbe6311eda5a38b78cd2cff7cb7677a0705da86139f9c5a61d6b78ee37a8d8184fb2e372e9f28d7a7822fbac863b6b839a68002f99e108db2426ab414f0c5c236211279a467aca4f9038ad6fdee1757506175f3b9e0f25cb2a8878328672f69c5773e4e0a02b6fe4df2cb273f0f54d34fe8a338540de", 0xf1}, {&(0x7f0000000400)="91ffe19ab6eef34a3cf2bfc9f59861d380362f8b0fa49bfd18a38f971d3bd913ae6a0b95e632aea0db650c8ce25f98569db88b03bfb34fb5bfb75d562f6cbcd1f64beca5bc9979556321d5d842d917bbb4899b27a9b6e158cd14207366996fddd31878c7b7280382b1d752b3cfd2c90ccee48cf4f1ab310f73ce696497d757633c2232ea72a9d5a5415a499eae95dbc1d92358d44819bedf42773de8dfdd0d2cb1a9a02f5a1f7367134d06f6097eade0", 0xb0}], 0x4, &(0x7f0000000500)=[{0xc0, 0x10d, 0x3, "5f5afce121448aab6401c3fd5a7fa593a4f25a24632cf379f7614bbf269a56e55cf254ae27db007453159d5e00282bb3881949e2e3b83f1e174157f167aef3e8420d46954a99638034784e4f109c080a6f2c39c6fd3399f71840356b020678fce3f7bdeaddcef2a12cb562195d9f3c4cee1139170fc586493eb256e99d2fb7b9884a7b6daf85650aff3ca1c177100f34cb24dadf775d808b28ef4023ce3ddfa6f60c4b25a87a08848dd9c1ca0502"}, {0x88, 0x117, 0xffffffffffffff9f, "2084613829f4c91bf144f5f3fac21a0d8501e44cbfacf0a3f01d809ef53b69c044e70618e2ae3a8e908f0907525f25f86d849d4d897c2f67677a14359e6585706e7e4e9c6b3e6f675b452bfd31846636aacc5eb6dfe55873dcb208df29041bc303802a2b612245de92699981d20d712ec14b"}, {0x100, 0x106, 0x5, "d1d1f39238198c91576dca24c9da593c6d606408f31c8605e71b9d797ee9f2a5e42f96d87b150a8fbd592a68d0b17dd0c78d1ca42dc8be4367a843159db86cc4077677896b9d82bb22a0b196368ac99e9c99b5fdee5da4d39a0989702701566cf6e55d23bc7a2e4c73d565e200ecc4d5417a76427ab0b71ea482a57c5162233efcc427fb68b6d4fec4792b588d5f9c63b114402aab8820ec78a988d24f9a245fb794105872a6a0e5380253c4c5f6c3780cf71d4adf0eafcfc30707a3b00270a1c23cf811e54c54768dffe13fba2de30768715455fa7240489c4ee336c4a9c3d589e7a258dcb7d05fb48a9acd26"}, {0x58, 0x100, 0xff, "20018755d052785ee03a22d8617ad4bdc608f8fec3f4a1789bb1bcc6e9c98de763b88627e98819079cc75d452a37a6316ae8de9ad3fd8e864ad689bb3ca70984861ea4ea"}], 0x2a0, 0x20048081}, 0x400c080) r2 = fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000800)={[], 0xef0, 0x81, 0x1, 0x2, 0x7, r2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000880)={0x10001, 0x1, 0x6002, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000009c0)={0x8, &(0x7f00000008c0)=[{}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @local}, {}]}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000a00)=""/4096) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001a00)={0x0, 0xfff, 0x9, 0x3c, 0x51184ac9, 0x200, 0x1, 0x4, {0x0, @in6={{0xa, 0x4e24, 0xfff, @dev={0xfe, 0x80, [], 0x1b}, 0xffffffffffffff7f}}, 0xff, 0x5, 0x9, 0x100, 0x3f}}, &(0x7f0000001ac0)=0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001b00)={r3, 0x180000}, &(0x7f0000001b40)=0x8) r4 = add_key$user(&(0x7f0000001b80)='user\x00', &(0x7f0000001bc0)={'syz', 0x0}, &(0x7f0000001c00)="f9b5350e9d88c27e5721ea1245b2d267ce8ea840a58cd5c2746aef9072fb99382b7ed17f8f1cdb8262d62d4ed5dd652ade8c0a018e6e827746b4a6e7a39768dd8de95fbfee0e069fbf5bb3efa1f97f0b7f0488347526734ba1cba03e87ff2b6afe1c9a02730a436357d817e4e65bbcf3aa79ba", 0x73, 0xfffffffffffffffe) r5 = add_key(&(0x7f0000001c80)='cifs.idmap\x00', &(0x7f0000001cc0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r4, r5) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000001d00)=0x5) add_key$user(&(0x7f0000001d40)='user\x00', &(0x7f0000001d80)={'syz', 0x2}, &(0x7f0000001dc0)="40ad113d52eafb0feaea9c43fa2986524219ce7967157dea8df4ca25", 0x1c, 0xfffffffffffffffe) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000001e00)={0xf, @pix_mp={0x100000000, 0x1, 0xb5315258, 0x0, 0x0, [{0x29fb, 0x3}, {0x81c}, {0xfffffffffffffeff, 0x8}, {0x100, 0xa66}, {0x9, 0xc1b}, {0x589c, 0x7}, {0x1, 0x6}, {0x4, 0x8000}], 0x1, 0x7, 0x0, 0x1}}) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000e) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001f00)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x7, @empty, 0x5}], 0x2c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000001f40)=0x8, 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000002000)={0x9c0000, 0xc6a4, 0xb2, [], &(0x7f0000001fc0)={0xa20920, 0x2, [], @p_u16=&(0x7f0000001f80)=0x9}}) fsetxattr$security_ima(r0, &(0x7f0000002040)='security.ima\x00', &(0x7f0000002080)=@ng={0x4, 0x12, "7a2bd9bf67195a05d4"}, 0xb, 0x2) ioctl$int_out(r0, 0x5460, &(0x7f00000020c0)) [ 243.578805] IPVS: ftp: loaded support on port[0] = 21 10:54:35 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x400) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x402000, 0x186) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x88000, 0x12) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='efivarfs\x00', 0x204000, &(0x7f0000000180)=',/^\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000240)={r2, @in={{0x2, 0x4e20, @remote}}}, 0x84) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000300), 0x4) setxattr$security_ima(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0xd, "489a572e43cd"}, 0x8, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000400)={0x2, 'ip6tnl0\x00', 0x3}, 0x18) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x4e20, 0x1000, @empty, 0x8}, {0xa, 0x4e22, 0x98d6, @empty, 0x95}, 0x0, [0xecb, 0x1, 0x80000000, 0xb155, 0xdc, 0x7, 0x80, 0x4]}, 0x5c) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000004c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x179a00, @ipv4, 0x7}, @in6={0xa, 0x4e21, 0x7, @remote, 0x6ba}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e20}], 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000640)={0x1, 0x80000000, 0x8, [], &(0x7f0000000600)=0x4}) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000680), &(0x7f00000006c0)=0x18) splice(r1, &(0x7f0000000700), r0, &(0x7f0000000740)=0x54, 0x0, 0x8) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000780)=0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000007c0)={'NETMAP\x00'}, &(0x7f0000000800)=0x1e) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000840)={r2, 0x27, "6a40ed7ff838d12b954487ca3650f04e23feb970fc82fa3cb0bdc09a8804d0af7516cfb6255c88"}, &(0x7f0000000880)=0x2f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000008c0)={0x6, 0x89, 0x2, 0x8001, 0xc05f, 0x92d1, 0x1, 0x1, r2}, 0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000900)={r3, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000980)={'\x00', {0x2, 0x4e22, @multicast2}}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000009c0)=""/188, &(0x7f0000000a80)=0xbc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b00)={r0, 0x3, 0x1, 0x100, &(0x7f0000000ac0)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) accept4(r0, &(0x7f0000000b40)=@sco, &(0x7f0000000bc0)=0x80, 0x0) ioctl(r1, 0x3, &(0x7f0000000c00)="02ef464139d3e660688e14354d277e40347df49eaa15a4beb60fa09754c44d64f6c581400e4222f45af5a6660358d5d02c77") [ 243.963155] IPVS: ftp: loaded support on port[0] = 21 10:54:36 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400140, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8140}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x4040) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') getsockopt$inet_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000000200)=""/245, &(0x7f0000000300)=0xf5) setxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64\x00', &(0x7f00000003c0)='vcan0\x00', 0x6, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x401, @remote, 0x7}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000500)={r2, 0xb6, 0x20}, &(0x7f0000000540)=0xc) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000580)={0x3, "5f05c1a8877b8fc119ec3afd357e38c0b13cf1633750acfe24d46272cbbfb260", 0x2, 0x240, 0x36, 0x10001, 0x0, 0x1, 0x10000, 0x1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000600)={0x4, 0xae, 0x6, 0x7, 0x0, 0x1, 0x80000001, 0x7ff}, &(0x7f0000000640)={0xe5, 0xfff, 0x3, 0x7, 0xf2d2, 0x6, 0xba, 0xb8}, &(0x7f0000000680)={0x401, 0x0, 0x100000000, 0x6e, 0x2, 0x7, 0x4, 0xffff}, &(0x7f00000006c0), &(0x7f0000000740)={&(0x7f0000000700)={0x401}, 0x8}) mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000780)=0x739f, 0x3, 0x2) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f00000007c0)=0x8, 0x4) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000840)={0x1f, 0x3d, &(0x7f0000000800)="b31b22f80d90adf978fd5fd5387d7e83236a5d9e8507491aa2e68dc2aab52081b815ec798d05a8bfe23af9b8a0e609da8e4ac7eea0dd83f77fecf838b0"}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000880)={0xff, 0x8208, 0xffffffffffffffeb, 0x43c95fc1, r3}, &(0x7f00000008c0)=0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000900)={@broadcast, @broadcast, @local}, 0xc) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000940)={0x7fff, 0x1, 0x4, 0x0, 0x0, [], [], [], 0x9, 0x8}) fgetxattr(r0, &(0x7f0000000a80)=@random={'user.', 'security.SMACK64\x00'}, &(0x7f0000000ac0)=""/4096, 0x1000) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000001ac0)=0x2000000000000, 0x4) getsockopt$sock_int(r4, 0x1, 0x23, &(0x7f0000001b00), &(0x7f0000001b40)=0x4) r5 = request_key(&(0x7f0000001b80)='id_resolver\x00', &(0x7f0000001bc0)={'syz', 0x3}, &(0x7f0000001c00)='/dev/dlm-monitor\x00', 0xfffffffffffffffc) keyctl$describe(0x6, r5, &(0x7f0000001c40)=""/4096, 0x1000) close(r4) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000002cc0)={0x40, 0x2, &(0x7f0000002c40)="ea92b55a9778de7d666a94e324e3666202529980784857adcee3e5c6c79dd9fda7cfb1979c0619e4138da24150b9734a4e906a7a93972f978d3f63b378e7546e25bbee0e97b478e9", {0x20, 0x161433dc, 0x71797673, 0x7, 0x2, 0x950, 0x3, 0x1}}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r6 = openat$cgroup_ro(r0, &(0x7f0000002d00)='cgroup.events\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000002d40)={0x3, 0x80000000, 0x7fff, 0x3, 0x4}) mq_timedreceive(r6, &(0x7f0000002d80)=""/244, 0xf4, 0x531, &(0x7f0000002e80)={0x0, 0x1c9c380}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000002ec0)={r2, 0x6, 0x30}, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002f00)='/dev/sequencer\x00', 0x0, 0x0) [ 244.540218] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.564697] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.572394] device bridge_slave_0 entered promiscuous mode [ 244.616018] IPVS: ftp: loaded support on port[0] = 21 [ 244.785292] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.791697] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.814782] device bridge_slave_1 entered promiscuous mode 10:54:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x20600) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0xffffffffffffffae, 0x4) r1 = getpid() ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000080)={0xa05, "8158e09b9cba51c201ba6b22dfde73ff8b5bb673631f38171121ce262b72d1f9", 0x3, 0xfff, 0x5, 0x84, 0x20000, 0xc}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000100)={0x1, 0x1000, 0x103, 0x7, {0x74a, 0x7, 0x5, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) prlimit64(r1, 0x0, &(0x7f0000000200)={0x7fff}, &(0x7f0000000240)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000014c0)={r0, 0x0, 0x1000, 0xd0, &(0x7f00000003c0)="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", &(0x7f00000013c0)=""/208, 0xff}, 0x28) r4 = request_key(&(0x7f0000001580)='id_resolver\x00', &(0x7f00000015c0)={'syz', 0x2}, &(0x7f0000001600)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={'syz', 0x2}, 0x0, 0x0, r4) mount$9p_virtio(&(0x7f0000001640)='\x00', &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='9p\x00', 0x80088, &(0x7f0000001700)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@posixacl='posixacl'}, {@loose='loose'}, {@mmap='mmap'}], [{@dont_appraise='dont_appraise'}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, 'id_resolver\x00'}}]}}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000001780)={0xa, 0x3, 0x0, 0x5}, 0xa) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x4, 0x8, &(0x7f00000017c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0x3, 0x0, 0x80}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100010000}, @exit], &(0x7f0000001800)='syzkaller\x00', 0x4, 0x7e, &(0x7f0000001840)=""/126, 0x41100, 0x1, [], 0x0, 0xa}, 0x48) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001940)={0x0, 0x7, 0x9, 0x8001}, &(0x7f0000001980)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000019c0)={r6, 0x80000001}, 0x8) setpgid(r1, r1) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x1, {0xcc0, 0x79b, "dce828c73c2dfdf3e1b80f21837e61120b7f28f6c5e488fb483defc12a30d9038e1b23218a15007b8b98a11e7cf55ca338cb85696d979203d99177be23b3f5ebe2a512ecc3c9abb3ff16998bb820e7320e13d80ed504e86be757802beda9f4500e2a5c663e73252a9ce63ea358e3da19ff6e56d3d0d41a26125cd49d051fa4b4313da386f39b905ff0f2c7b72909716a52d241d0a5b2dfb6146674c0c4b61474269b9af25d6012f197132efd5c2969b2ee7b681f5d2ee20b3836eea69e701a4e1fc053e234712c9eee94e3f98ecaed48e9674dfc5144e00cbbf34fe2929bbae15bdbd8c01b8f1152bcedb40893eea398354cc69a0f08064ac392452aec8434b2", 0x0, 0xdd4, 0xfffffffffffffff8, 0x3, 0x100000000, 0x6, 0xffffffff80000001, 0x1}, r2}}, 0x128) select(0x40, &(0x7f0000001b40)={0x0, 0x7, 0x0, 0x10000, 0x7, 0x5, 0x2, 0x5fa9}, &(0x7f0000001b80)={0x1, 0xfffffffffffffeab, 0x6e3, 0x2, 0x4, 0x878c, 0x1, 0x1}, &(0x7f0000001bc0)={0x101, 0x8001, 0x1ff, 0x1, 0x3ff, 0x9, 0x2, 0x100}, &(0x7f0000001c00)={0x0, 0x7530}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000001c40)=0x7, 0x4) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001c80), &(0x7f0000001cc0)=0xb) linkat(r5, &(0x7f0000001d00)='./file0/file0\x00', r0, &(0x7f0000001d40)='./file0\x00', 0x0) mknodat(r0, &(0x7f0000001d80)='./file0\x00', 0x5e1, 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001dc0)={0x40000000, 0x0, "7653a102ff12d3ced3059330528edd5d08c4ba24b0962a08ecbeaf7a481f77fe", 0x6, 0x1, 0x1760, 0x20, 0x9, 0xa4c, 0xcf96, 0x3, [0x200, 0x7, 0x6, 0x4]}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x329) mknodat(r0, &(0x7f0000001ec0)='./file0\x00', 0x200, 0x3) [ 245.010217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.198624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.237415] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.268668] IPVS: ftp: loaded support on port[0] = 21 [ 245.269689] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.282608] device bridge_slave_0 entered promiscuous mode [ 245.420581] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.441880] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.454677] device bridge_slave_1 entered promiscuous mode [ 245.625437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.645548] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.745149] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.764867] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.772196] device bridge_slave_0 entered promiscuous mode [ 245.789648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.803304] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.872570] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.889261] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.904960] device bridge_slave_1 entered promiscuous mode [ 246.015785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.090725] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.100311] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.110457] device bridge_slave_0 entered promiscuous mode [ 246.121472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.144117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.155693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.262838] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.275463] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.288059] device bridge_slave_1 entered promiscuous mode [ 246.308919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.420796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.513942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.528221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.544834] team0: Port device team_slave_0 added [ 246.552908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.585283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.642961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 246.653258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.668367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.718119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.754570] team0: Port device team_slave_1 added [ 246.820909] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.837600] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.845360] device bridge_slave_0 entered promiscuous mode [ 246.911838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.980266] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.999653] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.007688] device bridge_slave_1 entered promiscuous mode [ 247.017590] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.030483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 247.042891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.107811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.125301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.153118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.172801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.181419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.213067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.241100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.251778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.277345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.289313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.316266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.334550] team0: Port device team_slave_0 added [ 247.339913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.362908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.388689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.411958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.426466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.435160] team0: Port device team_slave_1 added [ 247.524086] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.538457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.571365] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.584883] team0: Port device team_slave_0 added [ 247.591541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.611635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.624343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.669412] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.682827] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.691170] device bridge_slave_0 entered promiscuous mode [ 247.717469] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.726458] team0: Port device team_slave_1 added [ 247.744615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.787740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.815837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.825505] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.831869] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.844393] device bridge_slave_1 entered promiscuous mode [ 247.852805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.868252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.904040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.940044] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.966822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.981545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.004272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.024034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.034286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.042685] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.080780] team0: Port device team_slave_0 added [ 248.106527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.125621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 248.133944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.154786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.161901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.174325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.256991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.265013] team0: Port device team_slave_1 added [ 248.276625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.293817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.310523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.334696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.354025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.387031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.420564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.434792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.516149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.523109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.537349] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.570154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.648582] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.689557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.704198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.716809] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.743170] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.759190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.767773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.795021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.802423] team0: Port device team_slave_0 added [ 248.924210] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.946160] team0: Port device team_slave_1 added [ 248.998360] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.004902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.011894] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.018328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.051227] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.058579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.106843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.134299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.150277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.252061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.271093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.284548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.320046] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.334852] team0: Port device team_slave_0 added [ 249.383817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.401991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.414240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.501635] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.514488] team0: Port device team_slave_1 added [ 249.545265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.574943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.594059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.609531] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.615956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.622606] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.629066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.644210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.673411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.805930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.918004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.934771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.945110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.026398] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.032792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.039531] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.045938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.069247] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.083166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.093142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.123851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.139592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.174311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.239994] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.246423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.253088] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.259532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.278593] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.051583] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.058046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.064767] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.071171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.105007] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.153854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.164214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.612085] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.618530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.625262] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.631632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.678029] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.163676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.504004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.924007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.096575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.115974] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.370627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.592014] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.614327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.627321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.657282] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.750050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.779237] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.794140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.810415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.050495] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.061335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.196089] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.208528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.227727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.241101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.291912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.642046] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.663983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.686384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.770501] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.783684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.794537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.221956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 257.238566] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.256249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.276315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.289502] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.684161] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.696203] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.705071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.712231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.154801] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.113682] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) 10:54:51 executing program 0: 10:54:51 executing program 1: 10:54:51 executing program 0: 10:54:51 executing program 1: 10:54:51 executing program 1: 10:54:51 executing program 0: 10:54:51 executing program 2: 10:54:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:51 executing program 1: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x0) [ 259.717740] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:52 executing program 3: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000340)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000540)={0x0, 0xb0, "52be6456bfeb037bdab484e4dff40c787158efb51b5d415359b44c45bfc5f1ecf11a68f399107bb775b2a266737dae622a46cef0d78cd9ec3ce9873b22666b6d7c967ebe0aa5d22fbb3b930a193919f8f749eca6bbbb421cd4823210958f16da169bcb691f5c26928a6f0d684b97eab54249925e47b6754ae15e9e59b988a7cffe95b359fc73dfd2782cc14eec5079e692cc703cb032ce0b6c420c02be6034831307051df2224f4bacef60f1487c63fc"}, &(0x7f0000000640)=0xb8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000680)=r1, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000400)={{0x8, 0x9}, 'port1\x00', 0x0, 0x20, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x0, 0x3a4}) creat(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)="003e7bbb044fa408fbbd824d1be13659165a1bb3c9a0711e39dd2f4e8f993f2b893d154b8e4a492fca59642b23177477524ff755d9be8c24cce036be8934a2c01e5134b45dfeb3490010597d35b5a0ea931165559928e7f4e964ed4a34", 0x5d, 0x6}], 0x0, &(0x7f0000000b40)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x335, &(0x7f0000000600), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) prctl$setname(0xf, &(0x7f0000000140)='bdev^$\x00') rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000300)={0x3d, 0x8000, 0x9}) r3 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x40) chdir(&(0x7f0000000280)='./file0\x00') fchmod(0xffffffffffffffff, 0x140) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x0, 0x81}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000004c0)={'ipvs\x00'}, &(0x7f0000000500)=0x1e) [ 260.404397] hrtimer: interrupt took 30072 ns [ 260.461861] overlayfs: failed to resolve './file1': -2 10:54:52 executing program 4: ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000000000007f000000000000000200000000000000ada209d2700fbb5ed290cb2f5a7e32be90b41464f9b751503bc2fa0f34af18aa32dc05038eede50a9b"]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0001000000ff000000810000c9030000ec000040010008000000000026100000002000f3ff1f000000010020000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[]) 10:54:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000003c0)={'bond_slave_0\x00', {0x2, 0x0, @broadcast}}) 10:54:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=@ipv6_newroute={0x1c, 0x18, 0x501, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 10:54:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000240)) 10:54:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) [ 260.617255] usb usb1: usbfs: process 7651 (syz-executor5) did not claim interface 0 before use [ 260.626803] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:52 executing program 5: clone(0x92b2a900, &(0x7f0000000980), &(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000900)) 10:54:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:52 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getresuid(&(0x7f0000000480), &(0x7f0000000680), &(0x7f0000000500)) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x0, &(0x7f0000000540)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) unlink(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) alarm(0x0) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 10:54:52 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000200), 0xc) bind$bt_hci(r0, &(0x7f0000000140), 0xc) [ 260.693475] EXT4-fs (loop4): Invalid log cluster size: 4134 10:54:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b9c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 260.815696] kernel msg: ebtables bug: please report to author: Wrong len argument [ 260.827384] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 260.846811] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 260.872344] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 261.144662] overlayfs: failed to resolve './file1': -2 10:54:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x10000}) 10:54:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:53 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000000)='<') 10:54:53 executing program 3: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000340)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000540)={0x0, 0xb0, "52be6456bfeb037bdab484e4dff40c787158efb51b5d415359b44c45bfc5f1ecf11a68f399107bb775b2a266737dae622a46cef0d78cd9ec3ce9873b22666b6d7c967ebe0aa5d22fbb3b930a193919f8f749eca6bbbb421cd4823210958f16da169bcb691f5c26928a6f0d684b97eab54249925e47b6754ae15e9e59b988a7cffe95b359fc73dfd2782cc14eec5079e692cc703cb032ce0b6c420c02be6034831307051df2224f4bacef60f1487c63fc"}, &(0x7f0000000640)=0xb8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000680)=r1, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000400)={{0x8, 0x9}, 'port1\x00', 0x0, 0x20, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x0, 0x3a4}) creat(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)="003e7bbb044fa408fbbd824d1be13659165a1bb3c9a0711e39dd2f4e8f993f2b893d154b8e4a492fca59642b23177477524ff755d9be8c24cce036be8934a2c01e5134b45dfeb3490010597d35b5a0ea931165559928e7f4e964ed4a34", 0x5d, 0x6}], 0x0, &(0x7f0000000b40)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x335, &(0x7f0000000600), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) prctl$setname(0xf, &(0x7f0000000140)='bdev^$\x00') rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000300)={0x3d, 0x8000, 0x9}) r3 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x40) chdir(&(0x7f0000000280)='./file0\x00') fchmod(0xffffffffffffffff, 0x140) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x0, 0x81}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000004c0)={'ipvs\x00'}, &(0x7f0000000500)=0x1e) 10:54:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 261.249715] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000300)) [ 261.448879] overlayfs: failed to resolve './file1': -2 10:54:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0001000000ff000000810000c9030000ec000040010008000000000026100000002000f3ff1f000000010020000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[]) 10:54:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) [ 261.699076] EXT4-fs (loop2): Invalid log cluster size: 4134 [ 261.785766] EXT4-fs (loop2): Invalid log cluster size: 4134 10:54:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:53 executing program 5: sched_setaffinity(0x0, 0xffffffffffffff6b, &(0x7f0000000940)=0x5) prctl$setname(0xf, &(0x7f0000000340)='vmnet0cgroup\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) write$P9_RSTATFS(r3, &(0x7f0000000280)={0x43}, 0x43) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000180)=""/84, 0xfffffd17, 0x3}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000000)=""/147, 0x93}}], 0x548838453d3ac6dc, 0x62, 0x0) r4 = semget(0x1, 0x0, 0x0) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000380)=0x3) 10:54:53 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x0) 10:54:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) 10:54:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) 10:54:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:54:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) r3 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000680)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000000000000000000000000000000"], 0x46) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000, 0x407000}]) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) open(&(0x7f0000000600)='./bus\x00', 0x40, 0x140) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) inotify_init1(0x0) getpid() getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xee00]) setregid(0x0, r6) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000000c0)) 10:54:54 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)={@loopback, @multicast2}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000cc0)=ANY=[@ANYBLOB="66696c7481720000000000000000000000000004000000000000000000000000040000000000000000000000000000000000000002d100000000000000021f15c7020e13000000000000000000ff01000000000000000000000004000000000000000000000000e09472064e3df8fe2f17dfd101b5081e09c18d884d53c40a261aafe945804dcfcb99348e66b0042d847e27f83c655e83379c63f269d9d76e930e446f6e04ee6c40f1305585921e64512779ffb998cd9f89e61f752f8114d9c8ce03e6e73d964e1efa8cf8639bb8ac6c3e7c997ed41400396994c606a0b27c54bfbefc3f0fb4aa11acf093ca43de4f6f2ae2e3610300000000000000400000e89713540e72929bd5d33b338587890a2ebed2a3d700000000000000f2f09dd6f506fdcfeee258a7761f0b7b155abe295f6cad9bf2e056ff07000000000000002315459bae18105a7f5b1ef9d75b1b1b754b36ae749611df552f02bf58ed352980d9e2454aeb6d599a835c0046e1cf47d2931aba70e6ea5b97f9e91a9134e64dec1e6448ad2b89a9b22c68a8e36d84756b3b3285ce695230d4ed7b5fe4ecb154317a08310b217c5fd2e2b17d976012233266415617e9c9733d"], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000c80)={0x1, 'ep0\x00', 0x2}, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) shutdown(r1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x4000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000500)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000480), &(0x7f0000000680)=0x8) openat$cgroup_type(r1, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000540)=0x80fb, 0x57) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000880)={"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"}) unshare(0x40000000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x4, 0x2, 0x400}) flistxattr(r0, &(0x7f0000000600)=""/105, 0x69) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x9, 0x20, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xdb, &(0x7f00000005c0)=0x7fffffffffffc, 0x4) write$FUSE_INTERRUPT(r2, &(0x7f0000000100)={0x10, 0x0, 0x6}, 0x10) getpid() clone(0xfffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ptrace(0x4206, r3) [ 262.442426] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 262.647372] audit: type=1804 audit(1542106494.499:31): pid=7784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/5/bus" dev="sda1" ino=16541 res=1 10:54:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) [ 262.888060] kernel msg: ebtables bug: please report to author: Wrong len argument [ 263.000666] IPVS: ftp: loaded support on port[0] = 21 [ 263.146382] audit: type=1804 audit(1542106494.999:32): pid=7774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/5/bus" dev="sda1" ino=16541 res=1 [ 263.257620] IPVS: ftp: loaded support on port[0] = 21 [ 263.338067] audit: type=1804 audit(1542106495.189:33): pid=7803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/5/bus" dev="sda1" ino=16541 res=1 10:54:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:56 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:56 executing program 5: sched_setaffinity(0x0, 0xffffffffffffff6b, &(0x7f0000000940)=0x5) prctl$setname(0xf, &(0x7f0000000340)='vmnet0cgroup\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) write$P9_RSTATFS(r3, &(0x7f0000000280)={0x43}, 0x43) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000180)=""/84, 0xfffffd17, 0x3}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000000)=""/147, 0x93}}], 0x548838453d3ac6dc, 0x62, 0x0) r4 = semget(0x1, 0x0, 0x0) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000380)=0x3) 10:54:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) r3 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000680)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000000000000000000000000000000"], 0x46) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000, 0x407000}]) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) open(&(0x7f0000000600)='./bus\x00', 0x40, 0x140) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) inotify_init1(0x0) getpid() getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xee00]) setregid(0x0, r6) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000000c0)) 10:54:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000240)) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) getpid() [ 265.105603] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:57 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) [ 265.269316] audit: type=1804 audit(1542106497.119:34): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/6/bus" dev="sda1" ino=16573 res=1 [ 265.348752] kernel msg: ebtables bug: please report to author: Wrong len argument 10:54:57 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)={@loopback, @multicast2}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000c80)={0x1, 'ep0\x00', 0x2}, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) shutdown(r1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x4000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000500)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000480), &(0x7f0000000680)=0x8) openat$cgroup_type(r1, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000540)=0x80fb, 0x57) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000880)={"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"}) unshare(0x40000000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x4, 0x2, 0x400}) flistxattr(r0, &(0x7f0000000600)=""/105, 0x69) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x9, 0x20, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xdb, &(0x7f00000005c0)=0x7fffffffffffc, 0x4) write$FUSE_INTERRUPT(r2, &(0x7f0000000100)={0x10, 0x0, 0x6}, 0x10) getpid() clone(0xfffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ptrace(0x4206, r3) 10:54:59 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:54:59 executing program 4: r0 = socket$inet(0x10, 0x400000000000003, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000002c00)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000003180), 0x0, &(0x7f0000003200)=""/233, 0xe9}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 10:54:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) getpid() 10:54:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 10:54:59 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:54:59 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) [ 267.957075] kernel msg: ebtables bug: please report to author: Wrong len argument [ 267.982549] EXT4-fs (loop5): #blocks per group too big: 4076871680 [ 268.079510] EXT4-fs (loop5): #blocks per group too big: 4076871680 [ 268.087884] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:00 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)={@loopback, @multicast2}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000c80)={0x1, 'ep0\x00', 0x2}, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) shutdown(r1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x4000, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000500)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000480), &(0x7f0000000680)=0x8) openat$cgroup_type(r1, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000540)=0x80fb, 0x57) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000880)={"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"}) unshare(0x40000000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x4, 0x2, 0x400}) flistxattr(r0, &(0x7f0000000600)=""/105, 0x69) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x9, 0x20, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xdb, &(0x7f00000005c0)=0x7fffffffffffc, 0x4) write$FUSE_INTERRUPT(r2, &(0x7f0000000100)={0x10, 0x0, 0x6}, 0x10) getpid() clone(0xfffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ptrace(0x4206, r3) 10:55:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) [ 268.314239] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) [ 268.384572] IPVS: ftp: loaded support on port[0] = 21 [ 268.478577] kernel msg: ebtables bug: please report to author: Wrong len argument [ 268.648325] IPVS: ftp: loaded support on port[0] = 21 10:55:02 executing program 2: 10:55:02 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:02 executing program 3: inotify_init1(0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r0, r2, &(0x7f0000000000), 0x80000001) 10:55:02 executing program 4: 10:55:02 executing program 4: [ 270.812740] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:02 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:02 executing program 2: 10:55:02 executing program 3: 10:55:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000002c0)={{0xfff}, 'port1\x00'}) 10:55:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:03 executing program 4: 10:55:03 executing program 2: 10:55:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:03 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0xe0000001, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 10:55:03 executing program 2: io_setup(0x1, &(0x7f0000000280)=0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0xffc3a1fa}]) 10:55:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000180)) [ 271.338026] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 10:55:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:03 executing program 5: 10:55:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000180)) 10:55:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 271.538095] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:03 executing program 2: 10:55:03 executing program 5: 10:55:03 executing program 3: 10:55:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:03 executing program 2: 10:55:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000180)) 10:55:03 executing program 5: 10:55:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:03 executing program 3: [ 271.796470] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:03 executing program 2: 10:55:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000180)) 10:55:03 executing program 5: 10:55:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:03 executing program 3: 10:55:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) 10:55:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 271.955579] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:03 executing program 2: 10:55:03 executing program 5: 10:55:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:03 executing program 3: 10:55:04 executing program 2: 10:55:04 executing program 5: 10:55:04 executing program 4: ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) 10:55:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:04 executing program 3: [ 272.221492] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:04 executing program 2: 10:55:04 executing program 5: 10:55:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:04 executing program 4: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000200)={{0x80}, 'port1\x00'}) 10:55:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:04 executing program 2: 10:55:04 executing program 3: [ 272.399474] kernel msg: ebtables bug: please report to author: Wrong len argument 10:55:04 executing program 5: 10:55:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:04 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{}, 'port1\x00'}) 10:55:04 executing program 3: 10:55:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:04 executing program 2: 10:55:04 executing program 5: 10:55:04 executing program 3: 10:55:04 executing program 2: 10:55:04 executing program 5: 10:55:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:04 executing program 4: 10:55:04 executing program 3: 10:55:04 executing program 1: r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:04 executing program 2: 10:55:04 executing program 4: 10:55:04 executing program 5: 10:55:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x1000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:04 executing program 3: 10:55:04 executing program 2: 10:55:04 executing program 4: 10:55:04 executing program 5: 10:55:04 executing program 1: r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:05 executing program 3: 10:55:05 executing program 2: 10:55:05 executing program 0: 10:55:05 executing program 5: 10:55:05 executing program 4: 10:55:05 executing program 1: r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:05 executing program 2: 10:55:05 executing program 0: 10:55:05 executing program 3: 10:55:05 executing program 5: 10:55:05 executing program 0: 10:55:05 executing program 3: 10:55:05 executing program 2: 10:55:05 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)="2e760d30a0", 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(0xffffffffffffffff) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x97b5, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x10001, 0x0, 0x77, 0x401, 0x4, 0x0, 0x3fe0000, 0x10001, 0x7ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x8000000000000000, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x800, 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) write$cgroup_int(r0, &(0x7f0000000580)=0x7, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 10:55:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000017d400300000000006506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)="505c881c"}, 0x48) 10:55:05 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x12}, 0xffffffffffffffd9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d090000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000008000000b700000000139b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f00000008c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x70, 0x1, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x800, 0x283, 0x1000, 0x4, 0x34, 0x3cd4, 0x80, 0x0, 0x3, 0x10000, 0x2bf, 0x800, 0x81, 0x0, 0xc35, 0xf3cc, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x400, 0x8, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000000}, 0xffffffffffffffff, 0x0, r1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x40000, 0x0) perf_event_open$cgroup(&(0x7f0000000c40)={0x0, 0x70, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x5, 0x8001, 0x0, 0x0, 0x5, 0x3, 0x0, 0x3, 0xfffffffffffffff7, 0x100000000, 0x0, 0x2, 0x0, 0x7fffffff, 0x0, 0x0, 0xffffffffffffff2e, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) getpid() mkdir(&(0x7f0000000c00)='\x00', 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xbd, &(0x7f00000000c0)="9a2f24082d20000000c1d26e5370", &(0x7f0000000340)=""/189, 0xf068}, 0x28) 10:55:05 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000400)={r2}) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x3, &(0x7f00000001c0), 0x41) r4 = gettid() r5 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x800, 0x4, 0x7fffffff, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x101, 0x3, 0x4, 0x7f, 0x297, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x6, 0x8000, 0xfffffffffffffff8, 0x1003, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x80000000000006, 0x6, 0x100000000, 0x4, 0x9}, r4, 0x1, r1, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0xc0189436, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) r6 = openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0xfffffffffffffffd, 0x40000, 0x0, 0x1, 0x5, 0x0, 0x7fff, 0x0, 0x1000000000000000, 0x0, 0x2d, 0xffffffff00000000, 0x2, 0x3, 0x9, 0xfffffffffffffffc, 0x9, 0x0, 0x1, 0x800, 0x4, 0x1, 0x3, 0x5, 0x4, 0x80, 0xe22, 0x3, 0x7, 0xfffffffffffffff9, 0x6, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0xc}, 0x2000, 0x4, 0x9, 0x3, 0x49b, 0x0, 0x2}, r0, 0xc, 0xffffffffffffff9c, 0x2) openat$cgroup_subtree(r6, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000700)=0xffffffff, 0x5df685beab9d9b3) socketpair(0x3, 0x800, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r7, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/49, 0x31, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r11, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r3) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000540)={r3, r8}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40286608, 0x20000001) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000580)={r10}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 10:55:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:05 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 273.760975] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 10:55:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) [ 273.908892] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize 10:55:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) [ 273.992211] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 10:55:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 274.087451] EXT4-fs (loop3): #blocks per group too big: 4076871680 [ 274.089606] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize [ 274.202753] EXT4-fs (loop3): #blocks per group too big: 4076871680 10:55:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 10:55:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:06 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000400)={r2}) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x3, &(0x7f00000001c0), 0x41) r4 = gettid() r5 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x800, 0x4, 0x7fffffff, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x101, 0x3, 0x4, 0x7f, 0x297, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x6, 0x8000, 0xfffffffffffffff8, 0x1003, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x80000000000006, 0x6, 0x100000000, 0x4, 0x9}, r4, 0x1, r1, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0xc0189436, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) r6 = openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0xfffffffffffffffd, 0x40000, 0x0, 0x1, 0x5, 0x0, 0x7fff, 0x0, 0x1000000000000000, 0x0, 0x2d, 0xffffffff00000000, 0x2, 0x3, 0x9, 0xfffffffffffffffc, 0x9, 0x0, 0x1, 0x800, 0x4, 0x1, 0x3, 0x5, 0x4, 0x80, 0xe22, 0x3, 0x7, 0xfffffffffffffff9, 0x6, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0xc}, 0x2000, 0x4, 0x9, 0x3, 0x49b, 0x0, 0x2}, r0, 0xc, 0xffffffffffffff9c, 0x2) openat$cgroup_subtree(r6, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000700)=0xffffffff, 0x5df685beab9d9b3) socketpair(0x3, 0x800, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r7, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/49, 0x31, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r11, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r3) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000540)={r3, r8}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40286608, 0x20000001) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000580)={r10}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 10:55:06 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000400)={r2}) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x3, &(0x7f00000001c0), 0x41) r4 = gettid() r5 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x800, 0x4, 0x7fffffff, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x101, 0x3, 0x4, 0x7f, 0x297, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x6, 0x8000, 0xfffffffffffffff8, 0x1003, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x80000000000006, 0x6, 0x100000000, 0x4, 0x9}, r4, 0x1, r1, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0xc0189436, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) r6 = openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x0, 0x0, 0x1, 0x80000001, 0x0, 0xfffffffffffffffd, 0x40000, 0x0, 0x1, 0x5, 0x0, 0x7fff, 0x0, 0x1000000000000000, 0x0, 0x2d, 0xffffffff00000000, 0x2, 0x3, 0x9, 0xfffffffffffffffc, 0x9, 0x0, 0x1, 0x800, 0x4, 0x1, 0x3, 0x5, 0x4, 0x80, 0xe22, 0x3, 0x7, 0xfffffffffffffff9, 0x6, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000005c0), 0xc}, 0x2000, 0x4, 0x9, 0x3, 0x49b, 0x0, 0x2}, r0, 0xc, 0xffffffffffffff9c, 0x2) openat$cgroup_subtree(r6, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000700)=0xffffffff, 0x5df685beab9d9b3) socketpair(0x3, 0x800, 0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r7, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r7, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/49, 0x31, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r11, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r3) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000540)={r3, r8}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40286608, 0x20000001) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000580)={r10}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 10:55:06 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 274.454292] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 274.506695] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 274.534366] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 274.541518] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app 10:55:06 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 274.629783] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize 10:55:06 executing program 2: syz_emit_ethernet(0x3fe, &(0x7f0000000300)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3f0, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 10:55:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000005ffc)=0x5, 0x4) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 274.820341] EXT4-fs (loop4): quotafile must be on filesystem root 10:55:06 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={"6e617407fffffe00", 0x19, 0x2, 0x294, [0x20000340, 0x0, 0x0, 0x20000370, 0x200004dc], 0x0, &(0x7f0000000100), &(0x7f0000000340)=ANY=[@ANYBLOB="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"]}, 0x30c) 10:55:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000033ff4), &(0x7f000000fff8)='./file0\x00', &(0x7f0000032ffb)='fuse\x00', 0x7ffbf, &(0x7f0000032000)) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 10:55:06 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 275.026870] xt_time: unknown flags 0x74 10:55:06 executing program 3: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x0, 0x0) 10:55:06 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f0000000240)}, 0x20) 10:55:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x1, 0x178, [0x0, 0x20000000, 0x20000030, 0x20000060], 0x0, &(0x7f0000000240), &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000001100000011000000000076657468315f746f0000000000000004626f6e643000000000000000000000006e7230fbffffffffffffff000000000062726964676530000000000000000000aaaaaaaaaabb0000000000009bee2ae43ccc00000000000000007000000098000000c00000000000000000000000000000000000000000000000000000000000000000000000040000000000000072656469726563741000000000000000000000000000000000000000000000000400000000000000f850c57a5148dfafdca6358ef7cd4a32e0d2af7450dfbb29d59f9ac02d060d973c7cd800579672cd"]}, 0x1f0) 10:55:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 275.083764] EXT4-fs (loop4): quotafile must be on filesystem root 10:55:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:07 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 275.241921] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:55:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x198) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040), 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 10:55:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 275.310774] EXT4-fs (loop4): quotafile must be on filesystem root 10:55:07 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x970, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}, 0x9e8) 10:55:07 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) 10:55:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:07 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 275.470204] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the (last) chain 10:55:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000009c0), &(0x7f00000007c0)=0x60) 10:55:07 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) [ 275.631228] EXT4-fs (loop4): quotafile must be on filesystem root 10:55:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:07 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/67) shmget(0x2, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/103) 10:55:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000049c0)=[{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000003c0)=[@assoc={0x18}], 0x18}, {0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x40000}], 0x2, 0x0) 10:55:08 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:08 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:08 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(0xffffffffffffffff, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 277.085298] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000280)}}, &(0x7f0000000140)) 10:55:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:09 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:09 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:09 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:09 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 277.396595] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 277.635719] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000280)}}, &(0x7f0000000140)) 10:55:10 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:10 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 278.191635] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:10 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:10 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0xffffffffffffffd9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) [ 278.396574] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:10 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=t\np,', {'port'}}) 10:55:10 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:10 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000180), &(0x7f00000002c0)=""/26}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r2, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:11 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:11 executing program 3: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 10:55:11 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x0, 0x1, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 279.117332] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 279.153014] 9pnet: Could not find request transport: t [ 279.153014] p 10:55:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) r5 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:11 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:11 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 279.372237] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b700"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:11 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b70000000000000095"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:11 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 279.638712] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:11 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b7000000000000009500000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:12 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x800000000056, @time={0x0, 0x989680}}) 10:55:12 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffdc04000040000000b7050000230000006a0a00fe000000008500000036000000b70000000000000095000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) 10:55:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) r5 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) [ 280.212069] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:12 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x989680}}) 10:55:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:12 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6, 0x2, 0x0, 0x0, 0x0, 0x11}, 0x98) 10:55:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6, 0x0, 0x0, 0x8000, 0x0, 0x11}, 0x98) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1fef0) [ 280.470567] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:12 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x989680}}) 10:55:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) r5 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:12 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') read$FUSE(r0, &(0x7f0000000340), 0x1000) 10:55:12 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 281.079906] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:13 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x989680}}) 10:55:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:13 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x7e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/32, &(0x7f0000000200)=0x20) 10:55:13 executing program 1: [ 281.327858] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:13 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) r5 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:13 executing program 2: 10:55:13 executing program 1: 10:55:13 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:13 executing program 2: 10:55:13 executing program 1: [ 281.644643] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:13 executing program 2: [ 281.963799] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:14 executing program 1: 10:55:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:14 executing program 2: 10:55:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) 10:55:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:14 executing program 2: 10:55:14 executing program 1: 10:55:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) [ 282.485097] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:14 executing program 2: 10:55:14 executing program 1: 10:55:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) [ 282.842521] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:14 executing program 1: 10:55:14 executing program 2: 10:55:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:14 executing program 1: 10:55:14 executing program 2: [ 283.079324] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) 10:55:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:15 executing program 2: 10:55:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:15 executing program 1: 10:55:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0xe, 0x39ba}, 0x2c) 10:55:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:15 executing program 1: 10:55:15 executing program 2: [ 283.764132] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0x0, 0x39ba}, 0x2c) 10:55:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:15 executing program 1: [ 283.983157] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:16 executing program 2: 10:55:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe}, 0x2c) 10:55:16 executing program 1: 10:55:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:16 executing program 1: 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 10:55:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 284.198757] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:16 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=t\np,', {'port'}}) 10:55:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4020940d, 0x0) [ 284.369984] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 284.408924] 9pnet: Could not find request transport: t [ 284.408924] p [ 284.446229] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 284.459589] EXT4-fs (loop2): #blocks per group too big: 4076871680 [ 284.467002] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 284.570310] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 284.616351] EXT4-fs (loop2): #blocks per group too big: 4076871680 10:55:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b707000001000000507000000000e0ff48000000000000009500000000000000"], &(0x7f0000000540)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x73, 0xf2, &(0x7f00000000c0)="35ae97d357f9998a2368ccfe8d423d9b993982cab1f068d6b6f0d8dfa22bd1bc7b1c23cda8c6ab7a4b12b8d33e4cb1bfa040312bebbbebb32e5a15a0cd41571bbfb688848c4ef70432c00055845dea5ecef3bdebdbf2fafe6740b2899665dce92ae04006cdcd7fa2b4d7c95db215c3879c0000", &(0x7f0000000300)=""/242}, 0x28) 10:55:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x80247009, &(0x7f0000000000)) 10:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)) 10:55:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 284.977406] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 284.997626] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 10:55:16 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df77c000000fe800000000000000000000000000000fe8000000000000000000000000000aa2c03010004019078000087ae00ca0cbb"], &(0x7f0000000000)) 10:55:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0bc5351, &(0x7f00000002c0)={{}, 'port1\x00'}) [ 285.057165] EXT4-fs (loop2): #blocks per group too big: 4076871680 10:55:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:17 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0)=0x20, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000100)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r0+30000000}, &(0x7f0000000240), 0x8) 10:55:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 285.319451] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448ca, &(0x7f0000000000)) 10:55:17 executing program 5: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0xfffffffffffffffc, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r0+30000000}, &(0x7f0000000240), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) 10:55:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 10:55:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) write(r2, &(0x7f0000000040)='z', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0x3) ioctl$TCFLSH(r1, 0x540b, 0x0) 10:55:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 285.486688] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:55:17 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0)=0x20, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000100)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r0+30000000}, &(0x7f0000000240), 0x8) 10:55:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}]}) 10:55:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:17 executing program 5: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0xfffffffffffffffc, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r0+30000000}, &(0x7f0000000240), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) 10:55:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) [ 285.787818] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 285.880294] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (60 log_block_size) [ 285.996269] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0x0, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:18 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x8000076, 0x0, 0x0, 0xdae6}]}) 10:55:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}]}) 10:55:18 executing program 1: r0 = socket$packet(0x11, 0x400000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={&(0x7f0000000800), 0xc, &(0x7f0000000040)={&(0x7f0000000400)=@setlink={0x28, 0x13, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8}]}, 0x28}}, 0x0) 10:55:18 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) getpid() 10:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0x0, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 286.432547] netlink: 'syz-executor1': attribute type 17 has an invalid length. 10:55:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(0xffffffffffffffff, &(0x7f00000006c0)) [ 286.473667] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 286.516235] netlink: 'syz-executor1': attribute type 17 has an invalid length. 10:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0x0, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}, {@lazytime='lazytime'}]}) 10:55:18 executing program 1: r0 = socket$inet(0x10, 0x400000000000003, 0x6) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000002c00)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000003180), 0x0, &(0x7f0000003200)=""/233, 0xe9}}, {{&(0x7f0000003580)=@l2, 0x80, &(0x7f00000036c0), 0x3bf, &(0x7f0000003700)=""/139, 0x8b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="1b0000001200030207fffd946fa283080f00190000000000000031", 0x1b}], 0x1}, 0x0) 10:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 286.751901] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 286.866577] netlink: 11 bytes leftover after parsing attributes in process `syz-executor1'. 10:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:18 executing program 5: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r1, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) recvmsg(r1, &(0x7f0000009e80)={&(0x7f0000008980)=@ll, 0x80, &(0x7f0000009d40), 0x0, &(0x7f0000000140)=""/137, 0x89}, 0x10002) sendmsg(r1, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) 10:55:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}]}) 10:55:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:19 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) getpid() [ 287.093732] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 10:55:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}]}) [ 287.333643] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 10:55:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) r2 = dup2(r0, r1) getdents(r2, &(0x7f00000000c0)=""/52, 0x34) 10:55:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@delalloc='delalloc'}]}) 10:55:19 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f756e69780099c755a74f579955a256c5a13b740f25f8e3989ea9b8f5c3f989eec3210c0f08ddfc696db6121254e950f17f91007e05f511f324") sendfile(r0, r1, &(0x7f0000000080)=0x100000, 0x800000bf) [ 287.614176] netlink: 11 bytes leftover after parsing attributes in process `syz-executor1'. [ 287.692187] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10000000011, r1, 0x0) sendmmsg(r0, &(0x7f0000004500)=[{{&(0x7f0000000180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000380)=[{0xb88, 0x0, 0x0, "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"}], 0xb88, 0x801}, 0x8001}], 0x1, 0x4040000) 10:55:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) ustat(0x0, &(0x7f0000000040)) dup3(r2, r0, 0x0) 10:55:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@lazytime='lazytime'}]}) 10:55:19 executing program 2: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x275, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) write(r0, &(0x7f0000000ec0)="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", 0x595) sendto$inet(r0, &(0x7f0000001480)='?', 0x1, 0x8040, &(0x7f0000000080), 0x10) 10:55:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 287.930488] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 287.990730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.997681] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@lazytime='lazytime'}]}) 10:55:20 executing program 2: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x275, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) write(r0, &(0x7f0000000ec0)="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", 0x595) sendto$inet(r0, &(0x7f0000001480)='?', 0x1, 0x0, &(0x7f0000000080), 0x10) [ 288.139376] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 288.448669] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x10000001}, {}], 0xff91) 10:55:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@lazytime='lazytime'}]}) 10:55:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 288.617376] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) r5 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) getsockopt$netlink(r5, 0x10e, 0xe, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) 10:55:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) ustat(0x0, &(0x7f0000000040)) dup3(r2, r0, 0x0) 10:55:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@delalloc='delalloc'}, {@lazytime='lazytime'}]}) 10:55:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x8000076, 0x0, 0xfffffffffffffffe}]}) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 10:55:20 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) sendto$inet(r1, &(0x7f0000000500)="d56a20ffc850e8d7c1adae1b9b7ce4928a4fe9ee06313e2d0de4bf5f5b8c2ef4aa9c6c4f0cc16b64c555b2238f1c8b0dee0f4e529de480cc68983e0661ecabc37a79b6aa6836adb377be24ca34b9ea8953237574573130f8a218219f794d80e24226bf601fd6fc7afd934979ffc47f2146f3b212bc052579d49dcb1c65daf1e0f0c3cd7e72bf0df3a9685988c792ced0735ae1dde356092b82860cbf66a531f91e61bf23d525e3a3f9baafcc9cd38725a5a3cae820fbc87398243169d0968e25d734e1f12ad794a1e636157335dad722dde79fa86298b942aac8068e3a822c33805359aba214d57d711ab79f437366", 0xef, 0x0, &(0x7f0000000380)={0x2, 0x4e21}, 0x10) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r2 = geteuid() ioctl$BLKBSZSET(r0, 0x40041271, &(0x7f0000000340)=0x1) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000840)={'yam0\x00', {0x2, 0x4e23, @multicast2}}) write(0xffffffffffffffff, &(0x7f00000000c0)="6c5d37cd2f126908afa76eb2ca3066155a0eeaf800f03a91ef9f788d8957bd9e33f5c3081a00e2ab6248d03c4f48d84073728ad17b284b07701e86582e90a13d9ca2f801df72837d28d8b88783a5d81fea253065dd58de41ac116e6c6f6f1b59a16bb6c570f5ea7aedc53f1ada054de671916ec3325c2ec40eafac6f4fcecf1cdc76ce76d0fe544cd907384f48711f2ed402d8c5bcdea765235229ef6b4a2b1dcbe6", 0xa2) io_setup(0x2, &(0x7f0000000640)=0x0) io_getevents(r3, 0x3, 0x3, &(0x7f0000000680)=[{}, {}, {}], &(0x7f0000000700)={0x0, 0x989680}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000300)={r5}) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000980)=0x9) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f00000004c0)=0x2805dd7d56a, 0xfd9d) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) connect$inet6(r4, &(0x7f00000003c0)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) socketpair(0xa, 0x0, 0x10000, &(0x7f0000000880)) r6 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000800)={0x0, r2, r6}, 0xc) getresgid(&(0x7f0000000180), &(0x7f0000000400), &(0x7f0000000600)=0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f00000009c0), &(0x7f00000007c0)=0x60) fchown(r4, r2, r7) lsetxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64IPOUT\x00', &(0x7f0000000940)='/selinux/policy\x00', 0x10, 0x3) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) 10:55:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40100000000000c, 0xe, 0x39ba}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000340)=""/210}, 0x18) [ 288.894903] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) [ 288.920997] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@delalloc='delalloc'}, {@lazytime='lazytime'}]}) [ 289.064613] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@delalloc='delalloc'}, {@lazytime='lazytime'}]}) 10:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000500)) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:21 executing program 0: [ 289.284480] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:21 executing program 2: 10:55:21 executing program 0: 10:55:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) ustat(0x0, &(0x7f0000000040)) dup3(r2, r0, 0x0) 10:55:21 executing program 4: 10:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) [ 289.725205] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:21 executing program 5: 10:55:21 executing program 0: 10:55:21 executing program 4: 10:55:21 executing program 2: 10:55:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) ustat(0x0, &(0x7f0000000040)) dup3(r2, r0, 0x0) 10:55:22 executing program 4: 10:55:22 executing program 0: 10:55:22 executing program 2: [ 290.185751] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:22 executing program 0: 10:55:22 executing program 4: 10:55:22 executing program 5: 10:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:22 executing program 2: 10:55:22 executing program 4: 10:55:22 executing program 5: 10:55:22 executing program 0: 10:55:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r2, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:22 executing program 5: 10:55:22 executing program 4: 10:55:22 executing program 0: 10:55:22 executing program 2: [ 290.726289] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:22 executing program 5: 10:55:22 executing program 0: 10:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(0xffffffffffffffff, r3, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:22 executing program 4: 10:55:22 executing program 5: 10:55:22 executing program 0: 10:55:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup3(r1, r0, 0x0) 10:55:23 executing program 5: 10:55:23 executing program 4: [ 291.141748] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1, 0x0, &(0x7f0000000040), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0xaaaaba7, 0x0, &(0x7f0000000040)=[@cstype3={0x5, 0xf}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 291.256106] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:23 executing program 5: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f0000027000)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f0000000140)='./file0/bus\x00', 0x0) 10:55:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff4f, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x89, &(0x7f00000002c0)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f"}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, @perf_bp={&(0x7f0000000040)}, 0x40000000100, 0x0, 0x1000000000007, 0x0, 0xfffffffffffffff9, 0x0, 0x2a9b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) [ 291.298305] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 291.555693] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) socket$kcm(0x10, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:23 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000040)="e711a562249a72b29a1d2d7a30df9e3dca4161212f32657b"}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 10:55:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff4f, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x89, &(0x7f00000002c0)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f"}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, @perf_bp={&(0x7f0000000040)}, 0x40000000100, 0x0, 0x1000000000007, 0x0, 0xfffffffffffffff9, 0x0, 0x2a9b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) 10:55:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup3(r1, r0, 0x0) 10:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:23 executing program 0: socket$kcm(0x11, 0x8000000c, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r1, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000080)) socketpair(0x8, 0x8000a, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(r2, &(0x7f0000000400)="00128bfeeeb2dd8463", 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r2, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r4, 0x6, 0x1, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r4, 0x7, 0x1, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2f6993202d70696473202b637075202df4646d61e512247ee0b383cac4afac41266d656d9659d6cb41a76f3d7e326ea380"], 0x31) sendmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="603fc410f0c5c3447f5b5712e4ff19f5c4e8327238597c8aa252cffb7a34f00947461fdea5e90ce3a978f1c02066c586156000d719a1afb7886e0472323b0ca9e563f3f7e8517856a8fca2242b508e4f09139660", 0x54}], 0x1, &(0x7f00000003c0), 0x0, 0x800}, 0x4000814) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r4}) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000680)=r4) gettid() ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)="2e2f6367726f75702f2e797a30eb", 0x1ff) write$cgroup_int(r5, &(0x7f0000000600)=0x6, 0x12) socket$kcm(0x29, 0x2, 0x0) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000700)=@nl=@kern={0x10, 0x0, 0x0, 0x4020100}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000a00)="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", 0xfd}], 0x1, &(0x7f0000000280), 0x0, 0x8d0}, 0x40000) r6 = openat$cgroup_ro(r3, &(0x7f0000000980)="2f02726f0500000074617000895059372f9199aac15bbb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x1) socket$kcm(0x29, 0xb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\'', 0x1ff) setsockopt$sock_attach_bpf(r1, 0x6, 0x19, &(0x7f0000000200), 0x29b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz0\x00', 0x1ff) recvmsg$kcm(r6, &(0x7f0000000f40)={&(0x7f0000000c80)=@xdp, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)=""/184, 0xb8}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/13, 0xd}, {&(0x7f0000000e00)=""/2, 0x14a}, {&(0x7f0000000e40)}], 0x5, &(0x7f0000000f00)=""/21, 0x15, 0xee7}, 0x100) 10:55:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf1000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 292.155245] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f00000003c0)) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 292.241448] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:24 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x40041284, &(0x7f0000000140)) [ 292.352155] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:24 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000300)='\x00', 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000180), 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 292.580759] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:24 executing program 0: socket$kcm(0x11, 0x8000000c, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r1, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000080)) socketpair(0x8, 0x8000a, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(r2, &(0x7f0000000400)="00128bfeeeb2dd8463", 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r2, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r4, 0x6, 0x1, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r4, 0x7, 0x1, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2f6993202d70696473202b637075202df4646d61e512247ee0b383cac4afac41266d656d9659d6cb41a76f3d7e326ea380"], 0x31) sendmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="603fc410f0c5c3447f5b5712e4ff19f5c4e8327238597c8aa252cffb7a34f00947461fdea5e90ce3a978f1c02066c586156000d719a1afb7886e0472323b0ca9e563f3f7e8517856a8fca2242b508e4f09139660", 0x54}], 0x1, &(0x7f00000003c0), 0x0, 0x800}, 0x4000814) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r4}) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000680)=r4) gettid() ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)="2e2f6367726f75702f2e797a30eb", 0x1ff) write$cgroup_int(r5, &(0x7f0000000600)=0x6, 0x12) socket$kcm(0x29, 0x2, 0x0) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000700)=@nl=@kern={0x10, 0x0, 0x0, 0x4020100}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000a00)="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", 0xfd}], 0x1, &(0x7f0000000280), 0x0, 0x8d0}, 0x40000) r6 = openat$cgroup_ro(r3, &(0x7f0000000980)="2f02726f0500000074617000895059372f9199aac15bbb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x1) socket$kcm(0x29, 0xb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\'', 0x1ff) setsockopt$sock_attach_bpf(r1, 0x6, 0x19, &(0x7f0000000200), 0x29b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz0\x00', 0x1ff) recvmsg$kcm(r6, &(0x7f0000000f40)={&(0x7f0000000c80)=@xdp, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)=""/184, 0xb8}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/13, 0xd}, {&(0x7f0000000e00)=""/2, 0x14a}, {&(0x7f0000000e40)}], 0x5, &(0x7f0000000f00)=""/21, 0x15, 0xee7}, 0x100) 10:55:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r1, &(0x7f00000004c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) dup3(r1, r0, 0x0) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:24 executing program 4: socket$kcm(0x11, 0x8000000c, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r1, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000080)) socketpair(0x8, 0x8000a, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(r2, &(0x7f0000000400)="00128bfeeeb2dd8463", 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r2, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r4, 0x6, 0x1, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r4, 0x7, 0x1, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2f6993202d70696473202b637075202df4646d61e512247ee0b383cac4afac41266d656d9659d6cb41a76f3d7e326ea380"], 0x31) sendmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="603fc410f0c5c3447f5b5712e4ff19f5c4e8327238597c8aa252cffb7a34f00947461fdea5e90ce3a978f1c02066c586156000d719a1afb7886e0472323b0ca9e563f3f7e8517856a8fca2242b508e4f09139660", 0x54}], 0x1, &(0x7f00000003c0), 0x0, 0x800}, 0x4000814) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r4}) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000680)=r4) gettid() ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x0, &(0x7f0000000440)}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)="2e2f6367726f75702f2e797a30eb", 0x1ff) write$cgroup_int(r5, &(0x7f0000000600)=0x6, 0x12) socket$kcm(0x29, 0x2, 0x0) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000700)=@nl=@kern={0x10, 0x0, 0x0, 0x4020100}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000a00)="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", 0xfd}], 0x1, &(0x7f0000000280), 0x0, 0x8d0}, 0x40000) r6 = openat$cgroup_ro(r3, &(0x7f0000000980)="2f02726f0500000074617000895059372f9199aac15bbb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x1) socket$kcm(0x29, 0xb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\'', 0x1ff) setsockopt$sock_attach_bpf(r1, 0x6, 0x19, &(0x7f0000000200), 0x29b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz0\x00', 0x1ff) recvmsg$kcm(r6, &(0x7f0000000f40)={&(0x7f0000000c80)=@xdp, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)=""/184, 0xb8}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/13, 0xd}, {&(0x7f0000000e00)=""/2, 0x14a}, {&(0x7f0000000e40)}], 0x5, &(0x7f0000000f00)=""/21, 0x15, 0xee7}, 0x100) [ 292.806115] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 292.852791] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 293.063662] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f00000003c0)) 10:55:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='_', 0x1}], 0x1) 10:55:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) [ 293.383247] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 293.415442] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:25 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x1044, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x1, 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 10:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r3, r4, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) [ 293.793095] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 10:55:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f00000003c0)) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x2, 0x0, 0x2, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x8}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 10:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 294.260492] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:26 executing program 4: inotify_init1(0x80800) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f0000000100), 0x769) 10:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:26 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)={0x10000000}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0x9) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) pipe(&(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x2, 0x4}) syz_open_pts(0xffffffffffffffff, 0x5) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000003c0)={0x8, 0x1ff, 0x0, 0x1000, &(0x7f0000002680)=""/4096, 0xa1, &(0x7f0000000240)=""/161, 0x7e, &(0x7f0000000300)=""/126}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0xfffffffffffffffe}, 0x28, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) sendmsg$key(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$KDSETLED(r5, 0x4b32, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r6, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, &(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x1}) 10:55:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 294.474340] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x34, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x100}]}, 0x34}}, 0x0) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) [ 295.259570] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 295.290409] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000", 0x1d, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) [ 295.429435] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x5}}]}) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 295.676841] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 295.696176] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 295.743994] EXT4-fs (loop5): #blocks per group too big: 4076871680 10:55:27 executing program 4: 10:55:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) [ 295.831025] syz-executor4 (9509) used greatest stack depth: 14040 bytes left [ 295.913786] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 295.940409] EXT4-fs (loop5): #blocks per group too big: 4076871680 [ 295.960519] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0xfffffefffffffffd, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:27 executing program 4: 10:55:27 executing program 5: 10:55:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f000000010000", 0x2c, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:28 executing program 4: 10:55:28 executing program 5: 10:55:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\a\x00\x00\x00', 0x0, 0x24a, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:28 executing program 5: [ 296.344944] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:28 executing program 4: 10:55:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:28 executing program 5: 10:55:28 executing program 0: 10:55:28 executing program 4: 10:55:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) dup3(r2, r0, 0x0) 10:55:28 executing program 4: 10:55:28 executing program 5: [ 296.874799] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 296.886499] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:28 executing program 0: 10:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:28 executing program 5: 10:55:28 executing program 4: 10:55:28 executing program 0: [ 297.101805] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:29 executing program 5: 10:55:29 executing program 4: 10:55:29 executing program 0: 10:55:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe", 0x33, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:29 executing program 5: 10:55:29 executing program 4: 10:55:29 executing program 0: 10:55:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) 10:55:29 executing program 0: 10:55:29 executing program 5: 10:55:29 executing program 4: [ 297.495616] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 297.526674] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000380), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=@ipv6_getnetconf={0x14, 0x52, 0x301}, 0x14}}, 0x0) 10:55:29 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)) [ 297.662017] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:30 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x8000076, 0x0, 0xfffffffffffffffe, 0xdae6}]}) waitid(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)) 10:55:30 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup2(r1, r0) 10:55:30 executing program 4: syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x7) 10:55:30 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0)={0x2, 0x3ff, 0x3}, 0xc) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r0, r1, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffefffffff82) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1fef0) r2 = accept4(r0, &(0x7f0000000040)=@ipx, &(0x7f00000000c0)=0x80, 0x0) write(r2, &(0x7f0000000540)="f6", 0x1) 10:55:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) [ 298.221624] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 298.245439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ff", 0x37, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 298.429588] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffefffffff82) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1fef0) r2 = accept4(r0, &(0x7f0000000040)=@ipx, &(0x7f00000000c0)=0x80, 0x0) write(r2, &(0x7f0000000540)="f6", 0x1) 10:55:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) [ 298.631381] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:55:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff, 0x3}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) [ 298.688560] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 298.867267] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 298.894603] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000200), 0x4) 10:55:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffefffffff82) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6, 0x0, 0x0, 0x8000, 0x0, 0x11}, 0x98) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1fef0) r2 = accept4(r0, &(0x7f0000000040)=@ipx, &(0x7f00000000c0)=0x80, 0x0) write(r2, &(0x7f0000000540)="f6", 0x1) 10:55:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f00000001c0)=0x2cc, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x1dd, 0x0) 10:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53", 0x39, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:31 executing program 4: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x275, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) write(r0, &(0x7f0000000ec0)="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", 0x595) sendto$inet(r0, &(0x7f0000001480)="3f0d0b0d66d017daf8f57eef8dfedcfc0fba9679b3a897ef49429eab770d465e0932532b4f026747427c9c32c220b8d88da6a23ec1330cd2b15902db00c20350f0789c32d00afec1ef62d8fb03dfd2d871b7695dece5d984a47471b0a41a7079a7f17e7874764b53d80d09214d1c6357aeac6d98a7b2c124005b522dba15b34a4a5afa711d5e6c5fb6ed1da08f3c933a0ab8610eeacb4fd6b151406e3997f2e2fbc24f38f61cbee468d4c0501c23f2289490b77d5b5e594df6bb7585e9cf9954ee95729289bf1e4927109f711a5a29c143467c5b688cba086e936a3afd977c67c596e0dc5eed7b491ffc9a7e405d3c4e7d2b24e3adcb69331087506235a2a14dd0d307618a379df9cd72e63a4fa60ed7bd286af00e4ecaa612af2d2f8e88a1d062a6b3a8b5860570df7db167859bb2d6234324c7b0ebfecc5f682bd2c848620d8a29a8871b5b4a733c0863c8cc323411fd2c01e15c6193e7c3b86a2fabf435ae61af542f1cf7f064d674c8b501762456651bcc363384fcbeaf8f84cfbdafc484ce7529a4bb20173baf5a82eded1bc07b02768d66a883ceb3a0c085efe6ba7cb32c747879bc316d5e5ce363e369f7f3be944291ccc386269e8b6edf0f637dce755498644b7b3fee4dbad440b142827dd37fe417eaf008b7963f3411f3dcb2ee857ce4808d1c21cccd4a5a1b7ec5eafa0cb45b551e31760205872ae20d756e475a1bd9e0a3e46c9052872ceb1d3b4a7b25a28e7922e3bd5c6440fd4a9cb6129b1d809043b8afa2aaff4139f3f9fc74ea9b893b02a0853089dff131f452d8b05c497f67a0810bed153bfae794f3e8ec3496ede8a0a0ab7ef82c15859ccce39766731f083968b2733c8bdc41a7f72d87f04568f72908d8b3e739a7751f3fc248d42d89b8471b389bcb3e3b4cc246f07587522a70b4ead7c8f2c894b23582b0f16bb1f49fa85d71a644be1678bb88cfb892ed6a96d2655e96b611d3ce9308fdd9719aaf12bb05430edafeab95902d2bc7d57c22c1310cfe3d63eea80c02fbc6f5ccc72d7a5634495d686d835cd4a03070ecf83edef36a586cf77e1e8bc95415b8ccf5cf03944c3af05a6bda477bff316796dcebd2563b013eb9860dfdb1d5ecd49e69ba142002e201068375df6e64f7dfd4df64fdebac446aaa1993ab74f19078dbb0326a18618d007aa9db8cb035b014ffda74a34a4e4c752126c34b49ca968a390469f54a2bd74877c59efcc0eb73f26e239c89f947b67c194e3b0a703680cf5852eb1ca0df8edd24c6b758dca5da751ef871ad80f70736672ba7661e8b8e5282127bd3f7d046223c2ed1f87a01b5e50269ddf58004be048d087680a7677d0566f49dbfc5ee5d4ffa8d869b83947e2130d6b57c49ee8940cc898e2f654ddcf04ba3f24c65ec2c167813482afaef178771cf3dbae1feb81810092e084cba5aad23196db657b09cc6cb5461826e324c0976603860d057d2618ee6daba57de7dffddeb754f1ed27af08b735b4eaef3586aa71e4ed2ff110b999745b886d34b17e66450c3e48a08cd1137f473ae2a39db8b85900c87884ad7900601d3be9a25a3f76f1ab454472fbadcc7a853af68841411afdc92e3172de834adb8c3e99876fe0f0fefb3df41a8e9617c5a872e036daa6b6ae18eeebd251018bc16f8acabb45537be9e5f112e8be51d7261123b5a0777c2e970fb1c74a34e3f4e51b46dc55d991c582271165e3278fa906a491d78d5ee6d4acfecc7c79ea24488a202a6db46dd534fb98ffd98818a547f08d5507555c264427613a6373db51edf0dc57eadaae18338656ee51752a4fcd62682ea911b72ed9a8daf3f1bb64653d89e22f58b6c0cbea32573f3651465ad603a7b6ae783a6527c00ada65b1d0fdedf34805d4a75e92431d598a406496e74061ba28c2704bb04dfa22eb74fe274c58f56803d033ff1a7805494a1d3c33a31fbe0494ebecb8d3ad35bed0b90496d7463d5a504845559b37b6af1b3e6fa2feeb82297314e9055d2ee74ec9f8c86", 0x594, 0x8040, &(0x7f0000000080), 0x10) [ 299.128891] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 299.136199] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r0) dup3(r0, 0xffffffffffffffff, 0x0) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000001c0)={0x8, 0x2, 0x1}) [ 299.390887] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 299.400396] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x0, 0x3}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000001840)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000001740)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000480)=""/147, 0x93}, {&(0x7f00000005c0)=""/99, 0x63}, {&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f0000001680)=""/143, 0x8f}, {&(0x7f0000000540)=""/33, 0x21}], 0x6, &(0x7f00000017c0)=""/112, 0x70}, 0x0) recvmmsg(r1, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) 10:55:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:31 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000001740)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000480)=""/147, 0x93}, {&(0x7f00000005c0)=""/99, 0x63}, {&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f0000001680)=""/143, 0x8f}, {&(0x7f0000000540)=""/33, 0x21}], 0x6, &(0x7f00000017c0)=""/112, 0x70}, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) 10:55:31 executing program 5: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) socket$kcm(0xa, 0x5, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6e652bb2ea7a7a3100", 0x200002, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x8, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900), 0x0, 0xc083}, 0x41) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair(0x11, 0x2, 0x7, &(0x7f00000002c0)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f00000019c0)=@ll={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002a40), 0x0, &(0x7f0000002a80), 0x0, 0x81}, 0x24000001) [ 299.747713] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 299.770638] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 299.783751] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 299.789434] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 299.868482] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 299.892885] netlink: 'syz-executor0': attribute type 29 has an invalid length. 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a}], 0x0, &(0x7f00000000c0)={[{@usrjquota='usrjquota='}]}) [ 299.921143] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 299.944556] netlink: 'syz-executor0': attribute type 29 has an invalid length. 10:55:31 executing program 5: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) socket$kcm(0xa, 0x5, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6e652bb2ea7a7a3100", 0x200002, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x8, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900), 0x0, 0xc083}, 0x41) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair(0x11, 0x2, 0x7, &(0x7f00000002c0)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f00000019c0)=@ll={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002a40), 0x0, &(0x7f0000002a80), 0x0, 0x81}, 0x24000001) [ 299.973207] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 299.986739] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 299.997678] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 300.011990] netlink: 'syz-executor0': attribute type 29 has an invalid length. 10:55:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) [ 300.023918] netlink: 'syz-executor4': attribute type 29 has an invalid length. 10:55:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x17a, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xffffffffffffff37}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 10:55:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) [ 300.152532] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x17a, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xffffffffffffff37}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 300.222835] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:32 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) 10:55:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) [ 300.357238] device lo entered promiscuous mode 10:55:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:32 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) [ 300.532818] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 300.562441] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) 10:55:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c903000005000000010008003c00000000000000002000f3ff1f0000000100000000f5ff6d5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)) [ 300.810266] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (60 log_block_size) [ 300.815053] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) [ 301.292695] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, &(0x7f0000000000)={r1}) 10:55:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8802, 0x0) process_vm_readv(0x0, &(0x7f0000000140), 0x0, &(0x7f0000002600), 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x2}) r0 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000002680)='/dev/rtc0\x00', 0x0, 0x0) keyctl$clear(0x7, r0) 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) [ 301.584411] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:33 executing program 5: 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:33 executing program 5: 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) [ 301.918724] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:33 executing program 5: 10:55:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff97, 0x0, 0x0, 0xffffffe4}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:34 executing program 5: 10:55:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:34 executing program 5: 10:55:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff97}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:34 executing program 5: 10:55:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:34 executing program 2: 10:55:34 executing program 5: 10:55:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:35 executing program 2: 10:55:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:35 executing program 5: 10:55:35 executing program 5: 10:55:35 executing program 2: 10:55:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x1, &(0x7f0000346fc8)=@raw=[@exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:35 executing program 2: 10:55:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:35 executing program 5: 10:55:35 executing program 2: 10:55:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:35 executing program 2: 10:55:35 executing program 5: 10:55:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(0xffffffffffffffff, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:36 executing program 2: 10:55:36 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) pselect6(0x381, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 10:55:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:36 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:36 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000380)=""/89, 0x59}], 0x1) 10:55:36 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() tgkill(r0, r0, 0x2e) ptrace(0x10, r0) 10:55:36 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) [ 304.361122] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) [ 304.447178] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.470150] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 10:55:36 executing program 5: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f0000000100), 0x80000001) 10:55:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) [ 304.516352] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.546776] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.570911] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.598091] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.627193] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.649735] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.665173] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.679272] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.683208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 304.706624] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 304.730339] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 304.757230] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.778733] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.794684] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.807810] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.830378] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.839210] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.846511] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.853354] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.860884] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.868136] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.875348] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 304.884757] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 10:55:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:36 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000048000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4={[], [], @local}}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 10:55:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:36 executing program 2: epoll_create1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f0000000100), 0x80000001) 10:55:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) [ 305.199825] FAT-fs (loop5): bogus number of reserved sectors [ 305.215719] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 305.238775] FAT-fs (loop5): Can't find a valid FAT filesystem 10:55:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000002c0), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000900000000000000000800819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000004a80)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) 10:55:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xffffffffffffff41) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000040)=""/4, 0xfffffffffffffda1, 0x3f00, &(0x7f0000000100)=@abs, 0xa) readv(r0, &(0x7f0000000100)=[{&(0x7f0000001300)=""/4096, 0x119a}], 0x2000000000000067) readv(r0, &(0x7f0000000580), 0x3c1) [ 306.001042] FAT-fs (loop5): bogus number of reserved sectors [ 306.009597] FAT-fs (loop5): Can't find a valid FAT filesystem 10:55:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, &(0x7f00000000c0), 0x20020102000007) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930000) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f00000003c0)) symlinkat(&(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000300)='./file0\x00') openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) 10:55:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:37 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xffffffffffffff41) recvfrom$unix(r2, &(0x7f0000000040)=""/4, 0xfffffffffffffda1, 0x3f00, &(0x7f0000000100)=@abs, 0xa) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000001300)=""/4096, 0x119a}], 0x2000000000000067) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40, 0x0) readv(r0, &(0x7f0000000580), 0x3c1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x75196f46911924e0, 0x0) getgid() 10:55:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5}, @exit], &(0x7f0000000200)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 10:55:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:38 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000000)=0x100000, 0x100000008001) 10:55:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r1, r0, 0x0) 10:55:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@empty, @empty, [{[{0x9100, 0x9, 0x5, 0x4}], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@alu={0x4, 0x5, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 10:55:38 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000380)={0xfffffffffffffffe}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) rt_sigreturn() 10:55:38 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000a80)}, 0x0) 10:55:39 executing program 0: [ 307.129183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:39 executing program 0: 10:55:39 executing program 4: 10:55:39 executing program 5: 10:55:39 executing program 0: 10:55:39 executing program 4: 10:55:39 executing program 5: 10:55:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x0) [ 307.738258] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:39 executing program 0: 10:55:39 executing program 4: 10:55:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r1, 0xffffffffffffffff, 0x0) 10:55:39 executing program 5: 10:55:39 executing program 2: 10:55:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@empty, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:39 executing program 2: 10:55:39 executing program 5: 10:55:39 executing program 4: 10:55:39 executing program 0: [ 308.102441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:40 executing program 2: 10:55:40 executing program 5: 10:55:40 executing program 0: 10:55:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:40 executing program 4: 10:55:40 executing program 2: 10:55:40 executing program 0: 10:55:40 executing program 5: 10:55:40 executing program 4: 10:55:40 executing program 5: 10:55:40 executing program 2: syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000001400), 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) 10:55:40 executing program 4: 10:55:40 executing program 0: 10:55:40 executing program 1: 10:55:40 executing program 5: 10:55:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x0, 0x7ff, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:41 executing program 4: 10:55:41 executing program 1: 10:55:41 executing program 2: 10:55:41 executing program 0: 10:55:41 executing program 5: 10:55:41 executing program 4: 10:55:41 executing program 1: 10:55:41 executing program 2: 10:55:41 executing program 5: 10:55:41 executing program 0: 10:55:41 executing program 4: 10:55:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:41 executing program 0: 10:55:41 executing program 2: 10:55:41 executing program 5: 10:55:41 executing program 1: 10:55:41 executing program 4: 10:55:41 executing program 1: 10:55:41 executing program 4: 10:55:41 executing program 2: 10:55:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$netlink(0x10, 0x3, 0x1f) close(r2) 10:55:41 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c2ff00000000000000b7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c343cbabfb4e32f1439006c7c78313c7b7e61e641a6cc53e6828a03fd5a33613ce37b93ecf7e27e7bd0ee892da4e3bb67068966c39f8e12dd019f87355be0a1892950b608f81c4fd9ae48d74c386fb2d44b2ea8d2757a4b5f30d626f25275", 0x2761, 0x0) 10:55:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x1a, 0x2) 10:55:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) pipe(&(0x7f0000000480)) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x2, 0x4}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000003c0)={0x8, 0x0, 0x0, 0x1000, &(0x7f0000002680)=""/4096, 0xa1, &(0x7f0000000240)=""/161, 0x7e, &(0x7f0000000300)=""/126}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0xfffffffffffffffe}, 0x28, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) sendmsg$key(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$KDSETLED(r5, 0x4b32, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r6, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, &(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x1}) 10:55:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x500) 10:55:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000240)={0x79}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0xa9, 0x0, &(0x7f0000000380), 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000200), 0x1) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:55:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000000), 0x4) 10:55:42 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x4021}) tkill(r1, 0x3b) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) 10:55:42 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x4021}) tkill(r2, 0x3b) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) 10:55:42 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) 10:55:42 executing program 0: r0 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 10:55:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x21, 0x1) 10:55:42 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) 10:55:42 executing program 1: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop'}, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='nfsd\x00', 0x0, 0x0) 10:55:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:43 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"6c6f000000000000000000000000ed1f", 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x7, 0x0, 0x0, 0x0, 0x83420004, r1}) 10:55:43 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 10:55:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffe65, 0x20008005, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 10:55:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x276, &(0x7f0000000100)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x93}], 0x2, &(0x7f0000002740)=""/218, 0xfffffffffffffd87}}], 0x3a2, 0x0, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14, 0x40000000042, 0x105}, 0x3c9}}, 0x0) 10:55:43 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') 10:55:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe0e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x9, 0x4) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000080)=""/95) 10:55:43 executing program 2: mprotect(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002c40)=[{&(0x7f00000019c0)=""/4096, 0x1000}], 0x1, 0x0) 10:55:43 executing program 4: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002c40)=[{&(0x7f00000019c0)=""/4096, 0x1000}], 0x1, 0x0) pwritev(r0, &(0x7f0000000500), 0x3c5, 0x0) 10:55:43 executing program 4: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002c40), 0x0, 0x0) pwritev(r0, &(0x7f0000000500), 0x3c5, 0x0) 10:55:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x6, 0x20be20, 0x8000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000040), &(0x7f0000000080)=""/73}, 0x18) 10:55:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) readv(r0, &(0x7f00000002c0), 0x0) getpeername(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000040)=0x80) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x9) 10:55:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003480)=[{{&(0x7f00000011c0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)=""/51, 0x33}], 0x1}}], 0x1, 0x0, &(0x7f0000000140)) 10:55:43 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000000000000040) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) 10:55:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:44 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaa759bef32000081100fe8000000000000000000000000000aab789e68f5d0bf2788ca1c740fe8000000000000000000000000000a2800090780000000000c99aef12471ebd690c8cfbec99e64951c2b4ff854a037f09aabd84e7182aa149bf28cb38ea9705d0c46fa2f4f5221f6b0a7cdb8cee84963913696b27b0828f0e5bfbea900c07d8a934e8146776b9ba5041abedf731"], &(0x7f0000000180)) 10:55:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000000000000040) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) 10:55:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000080)=""/57, 0x18) 10:55:44 executing program 1: getpriority(0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) 10:55:44 executing program 5: pipe(&(0x7f0000000380)) 10:55:44 executing program 2: 10:55:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[]}, 0x78) 10:55:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000e5ff00000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) [ 312.634118] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0xffffffffffffff4d}}], 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 10:55:44 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() tgkill(r0, r0, 0x2e) ptrace(0x10, r0) 10:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000034000), 0x4) syz_emit_ethernet(0x145, &(0x7f0000000080)={@random="199cdca81334", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, @multicast2}, @icmp=@dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @broadcast}}}}}}, 0x0) 10:55:44 executing program 5: r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000001980)=[{&(0x7f0000000380)=""/134, 0x86}], 0x1, &(0x7f0000001dc0)=[{&(0x7f0000001a00)=""/81, 0x51}], 0x1, 0x0) 10:55:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="b40000002e00000024000000000000109500000000000000"], &(0x7f0000000340)="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", 0x0, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x800000000001}, 0x48) 10:55:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x6cd, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000ffffffe5de170012000c00010067726574617000000800020004001200"], 0x1}}, 0x0) 10:55:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 10:55:44 executing program 1: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x2) 10:55:44 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) close(0xffffffffffffffff) 10:55:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000006c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) mkdirat$cgroup(r1, &(0x7f00000005c0)='syz0\x00', 0x1ff) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000400)={'syzkaller1\x00'}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000540)) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000500)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)={[{0x0, 'io'}]}, 0x4) openat$cgroup_ro(r1, &(0x7f0000000bc0)='memory.events\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) [ 313.007416] validate_nla: 16 callbacks suppressed [ 313.009930] netlink: 'syz-executor2': attribute type 29 has an invalid length. 10:55:44 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)='memory.events\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) [ 313.056355] netlink: 'syz-executor2': attribute type 29 has an invalid length. 10:55:44 executing program 1: r0 = socket$kcm(0x11, 0x1000000000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000200)=r1, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x20000380, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000300)) close(0xffffffffffffffff) recvmsg(r0, &(0x7f00000009c0)={&(0x7f00000003c0)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/3, 0x3}, {&(0x7f0000000680)=""/48, 0x30}, {&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/205, 0xcd}, {&(0x7f00000006c0)=""/82, 0x52}], 0x5, &(0x7f0000000940)=""/94, 0x5e, 0x7fff}, 0x40000000) 10:55:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x6, 0x1, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) 10:55:45 executing program 2: r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000440)=@rc, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000500), 0x0, 0x10}, 0x4801) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x10000120}, 0x80, &(0x7f00000006c0)}, 0x0) 10:55:45 executing program 4: 10:55:45 executing program 2: 10:55:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x6cd]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:45 executing program 2: 10:55:45 executing program 0: 10:55:45 executing program 4: 10:55:45 executing program 5: 10:55:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000440)={0x60003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) 10:55:46 executing program 0: 10:55:46 executing program 1: 10:55:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000600), &(0x7f0000000640)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x0, 0x3ff}, 0xc) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r1, r2, &(0x7f0000000100), 0x20000000009) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@empty, @empty, [{[], {0x8100, 0x6, 0x0, 0x10000000005}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x4305, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x0, 0xcbe]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000080)=""/16, &(0x7f0000000180)=0x10) 10:55:46 executing program 5: 10:55:46 executing program 2: 10:55:46 executing program 0: 10:55:46 executing program 5: 10:55:46 executing program 0: 10:55:46 executing program 2: 10:55:46 executing program 4: 10:55:46 executing program 1: 10:55:46 executing program 0: 10:55:46 executing program 2: 10:55:46 executing program 1: 10:55:47 executing program 1: 10:55:47 executing program 5: 10:55:47 executing program 4: 10:55:47 executing program 0: 10:55:47 executing program 2: 10:55:47 executing program 3: 10:55:47 executing program 4: 10:55:47 executing program 5: 10:55:47 executing program 0: 10:55:47 executing program 1: 10:55:47 executing program 2: 10:55:47 executing program 3: 10:55:47 executing program 4: 10:55:47 executing program 5: 10:55:47 executing program 1: 10:55:47 executing program 0: 10:55:47 executing program 3: 10:55:47 executing program 1: 10:55:47 executing program 2: 10:55:47 executing program 5: 10:55:47 executing program 0: 10:55:47 executing program 4: 10:55:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 10:55:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000007780)=[{{&(0x7f0000002d40)=@sco, 0x80, &(0x7f0000006540), 0x0, &(0x7f00000065c0)=[{0x10, 0x1}], 0x10}}], 0x1, 0x4040) 10:55:47 executing program 4: r0 = socket$inet(0x2, 0x4020000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) read(r0, &(0x7f0000000240)=""/98, 0x62) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 10:55:47 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0xfffffd79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x87}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 10:55:47 executing program 2: 10:55:47 executing program 5: 10:55:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)) 10:55:47 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0x9) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x2, 0x4}) syz_open_pts(0xffffffffffffffff, 0x5) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000003c0)={0x8, 0x1ff, 0x0, 0x1000, &(0x7f0000002680)=""/4096, 0xa1, &(0x7f0000000240)=""/161, 0x7e, &(0x7f0000000300)=""/126}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r5, 0x208200) r6 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0xfffffffffffffffe}, 0x28, 0x0) fcntl$setown(r6, 0x8, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) sendmsg$key(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) ioctl$KDSETLED(r6, 0x4b32, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r7, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, &(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x1}) 10:55:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x33, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xff82) [ 316.080484] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.099779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.164326] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.190207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 10:55:48 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)={0x10000000}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) eventfd(0x9) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x2, 0x4}) syz_open_pts(0xffffffffffffffff, 0x5) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000003c0)={0x8, 0x1ff, 0x0, 0x1000, &(0x7f0000002680)=""/4096, 0xa1, &(0x7f0000000240)=""/161, 0x7e, &(0x7f0000000300)=""/126}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:55:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="ed1b6a9032d125748a1b2c0c67d57004", 0x10, 0x1}], 0x0, &(0x7f0000000480)) [ 316.238500] netlink: 'syz-executor3': attribute type 29 has an invalid length. 10:55:48 executing program 1: r0 = timerfd_create(0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100), &(0x7f0000000140), 0x8) [ 316.282162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.318189] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.331403] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.350680] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.358666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.376724] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.389135] FAT-fs (loop2): bogus number of reserved sectors [ 316.395796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.404769] FAT-fs (loop2): Can't find a valid FAT filesystem [ 316.453809] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.474027] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 10:55:48 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x25b) [ 316.505720] FAT-fs (loop2): bogus number of reserved sectors [ 316.514522] FAT-fs (loop2): Can't find a valid FAT filesystem [ 316.537408] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.573753] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.592810] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.603333] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.620420] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 10:55:48 executing program 2: clone(0x202102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) socketpair(0x18, 0x4, 0x6, &(0x7f0000000080)) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) [ 316.660447] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.682504] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.689618] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.748751] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.779294] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.803144] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.810657] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.818472] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.828298] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.843113] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 316.867991] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 316.911817] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.922147] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.929283] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.943597] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 10:55:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x89b1, &(0x7f0000000140)={'veth1_to_team\x00'}) [ 316.959427] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.966420] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.973277] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.980339] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.987256] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 316.995038] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 317.022362] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 317.049624] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 10:55:49 executing program 3: r0 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x0, 0x2}) 10:55:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000400), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000300)="0f0f7f771c3e65f365362e0f01c865d0af000067f20f217166b9240a000066b83b00000066ba000000000f303664650f01ca0f20900f013466b9800000c00f326635000800000f30670fc79d63f40000", 0x50}], 0x3cd, 0x1f, &(0x7f0000000100), 0x3e9) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:49 executing program 4: r0 = socket(0x10, 0x20000000080003, 0xc) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[]], 0x1) write(r0, &(0x7f0000000040)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 10:55:49 executing program 0: socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 10:55:49 executing program 5: epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r1, r2, &(0x7f0000000100), 0x80000001) 10:55:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80003, 0x1) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) 10:55:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x1d}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:49 executing program 0: epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/3\x00') sendfile(r1, r2, &(0x7f0000000100), 0x80000001) 10:55:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x80000000005, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x84, 0x0, 0x3f}, @ipx={0xffff, 0x1e, 0x0, 0x0, {@broadcast, @broadcast}, {@current, @broadcast}}}, 0xcb) 10:55:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @remote}], 0x20) 10:55:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:49 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000f, 0x8032, 0xffffffffffffffff, 0x0) 10:55:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x1000000000000001) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 317.876999] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 317.914800] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x1d}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:49 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ppp\x00', 0x0, 0x0) clone(0x8860000, &(0x7f0000000140), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)) 10:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000780)=[@text64={0x40, &(0x7f00000004c0)="660f3a20e8002e2e0f23902e3e420fc7660048b867e275534fcc403c0f23d00f21f835100000080f23f865420f381e62020f009905000000b9800000c00f3235010000000f30420fae85000000800f225ef36741d01f", 0x56}], 0x1, 0x0, &(0x7f00000007c0), 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000240)=0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x113, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r2, 0xc}}, 0x10) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="2cb2a27eaf605f9e58de590907a6b6404aae0e18d5015928e22aab4a2dbc13f889d9cc8ef9ca25bc50112372bd62d0a5ea96dcb4d7ed0333eea7c8e8fe107b03a654432bfdc1b45d8fd091c373f56cdd43f31e54f191a97c37e987445aae1f41f8cf1bd500000000000000248c7e40fd796a5650a309f719962aa2a682d86060fd563d60be08e9b327db3d796c7177debe6bb2e24318eefd143845bd819b5f1602eddf85200f76dbeaaa0d31598470050db016a03e8e2cc00f9efb42a513765b2b8986b86888f1c3c1171c771aec6659eb3f3c5cc3b593fa82", 0xd9, 0x40000, &(0x7f00000003c0)={0xa, 0x4e23}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x4}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000ec0)={0x3, 0x0, [{0x6, 0x0, 0x0, 0x0, @msi}, {0x0, 0x2, 0x0, 0x0, @sint={0x2, 0x5}}, {0x0, 0x0, 0x0, 0x0, @sint={0x8000, 0x5}}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 317.993292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0xffffffff, 0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000840)="bc1f302f7501b4f3003add8bc18d2d8125f6087e37e00becb2f8f85777b9f52b3f7f4798b9f2416e34059b9820ae710c5b32f47a8ec9285d8d5cbe4cfbbceab2a833717bb75c69dabb5b2560b3d41e23fc0596e9a0ee9c4cadd095f42668f2e9197d02a3903cbbcf4c0c77055dc86658d91f4841db5949dd47f7834682bf0833e962d3922ff046b7bddf76689854c271a6fb8dce03258ac555a8c9421d8713adfde2f8361d82f439d5601d47cc09cf129197ca642c4ee27882f987dc8b2dc0081186c8c51bb4e0437aef55188aefb0", 0xcf, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)="9a535b61117c83ec4741b067fbeed76b43768677c42d69924fc076a9b521ec20132f59f10f8ac3a1c623fe7263a155b22bed5f51e1451aae8c273d957f6d13b9c6878b01f8ea50bf21243be75aadfda35a9427409e6598fc97cc8fc5563a76784472831e5fde214ae988aee5021d3d2984b299d41907cb52c6e4ec2c3a115277b5530c23385ae666307aa55a2656809989a32db8460f3f550f11c186bb0765ada847f7b30b", 0xa5, 0x0) keyctl$link(0x8, r1, r2) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L-', 0x5}, 0x28, 0x2) poll(&(0x7f0000000800)=[{}], 0x1, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCSCTTY(r4, 0x540e, 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x2, 0x1a}, 0x20) 10:55:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000a80)={0x2, 0x0, @loopback}, 0x10) 10:55:50 executing program 1: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x200c031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 10:55:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x332, &(0x7f00001a7f05)=""/251}, 0x23) [ 318.267139] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 318.297631] minix_free_inode: bit 1 already cleared [ 318.478395] kvm: pic: non byte read 10:55:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002200000047000000000e00009500004000000000"], &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 10:55:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0xffffffff, 0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000840)="bc1f302f7501b4f3003add8bc18d2d8125f6087e37e00becb2f8f85777b9f52b3f7f4798b9f2416e34059b9820ae710c5b32f47a8ec9285d8d5cbe4cfbbceab2a833717bb75c69dabb5b2560b3d41e23fc0596e9a0ee9c4cadd095f42668f2e9197d02a3903cbbcf4c0c77055dc86658d91f4841db5949dd47f7834682bf0833e962d3922ff046b7bddf76689854c271a6fb8dce03258ac555a8c9421d8713adfde2f8361d82f439d5601d47cc09cf129197ca642c4ee27882f987dc8b2dc0081186c8c51bb4e0437aef55188aefb0", 0xcf, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)="9a535b61117c83ec4741b067fbeed76b43768677c42d69924fc076a9b521ec20132f59f10f8ac3a1c623fe7263a155b22bed5f51e1451aae8c273d957f6d13b9c6878b01f8ea50bf21243be75aadfda35a9427409e6598fc97cc8fc5563a76784472831e5fde214ae988aee5021d3d2984b299d41907cb52c6e4ec2c3a115277b5530c23385ae666307aa55a2656809989a32db8460f3f550f11c186bb0765ada847f7b30b", 0xa5, 0x0) keyctl$link(0x8, r1, r2) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L-', 0x5}, 0x28, 0x2) poll(&(0x7f0000000800)=[{}], 0x1, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCSCTTY(r4, 0x540e, 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x2, 0x1a}, 0x20) 10:55:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000300), 0x10, &(0x7f00000007c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="0002001500000000000000000060c5ccffa454a890d2ec450e6abaa884541ed0e2f1ac30d2a17c29c9a2978af3fcec4fc145068250bca3ce151b10238e565dbbef6e2f0fa4cc3ce0b489eb794eb7ed09a5cf0029adf83c"], 0x1}}, 0x0) 10:55:50 executing program 2: syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") 10:55:50 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x832, 0x0, @dev, @remote, {[@rr={0xffffff86, 0x3}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 10:55:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@register_looper], 0x0, 0x0, &(0x7f00000001c0)}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 10:55:50 executing program 1: clone(0x800200, &(0x7f00000015c0), &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000500)) mknod(&(0x7f0000000580)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000500), &(0x7f0000000200)) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000280)='attr/current\x00') write(r1, &(0x7f00000002c0), 0x0) process_vm_writev(r0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/212, 0xd4}], 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000840)=""/211, 0xd3}], 0x1, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x10000000000281, 0x0) 10:55:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x1) [ 318.859352] binder: 10942:10954 ERROR: BC_REGISTER_LOOPER called without request 10:55:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 318.924525] binder: 10942:10954 ioctl c0306201 200005c0 returned -14 10:55:50 executing program 3: [ 318.997996] MINIX-fs: mounting unchecked file system, running fsck is recommended 10:55:50 executing program 2: 10:55:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@register_looper], 0x0, 0x0, &(0x7f00000001c0)}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 10:55:50 executing program 3: 10:55:50 executing program 0: [ 319.129999] minix_free_inode: bit 1 already cleared 10:55:51 executing program 3: 10:55:51 executing program 2: [ 319.192504] binder: 10981:10983 ERROR: BC_REGISTER_LOOPER called without request 10:55:51 executing program 3: 10:55:51 executing program 1: 10:55:51 executing program 0: 10:55:51 executing program 2: [ 319.641223] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 319.648077] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 320.027088] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:55:51 executing program 4: 10:55:51 executing program 3: 10:55:51 executing program 0: 10:55:51 executing program 1: 10:55:51 executing program 2: 10:55:51 executing program 5: 10:55:52 executing program 3: 10:55:52 executing program 5: 10:55:52 executing program 0: 10:55:52 executing program 2: 10:55:52 executing program 4: 10:55:52 executing program 1: 10:55:52 executing program 5: 10:55:52 executing program 4: 10:55:52 executing program 0: 10:55:52 executing program 3: 10:55:52 executing program 2: 10:55:52 executing program 1: 10:55:52 executing program 5: 10:55:52 executing program 4: 10:55:52 executing program 2: 10:55:52 executing program 3: 10:55:52 executing program 1: 10:55:52 executing program 0: 10:55:52 executing program 4: 10:55:52 executing program 5: 10:55:52 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x1}, 0x58) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f00000001c0), 0x14) close(r0) 10:55:52 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) chdir(&(0x7f0000000000)='./file0\x00') 10:55:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x0) dup2(r0, r1) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) 10:55:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000040)={@remote}, 0x14) write$P9_RLERRORu(r1, &(0x7f0000000180)={0x14, 0x7, 0x0, {{0x7, 'filter\x00'}}}, 0x14) 10:55:52 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x1) 10:55:52 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000080)=""/90) 10:55:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000080), 0x200000000400000) 10:55:52 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x97, 0x0, &(0x7f0000000780)}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000005540), 0x4) 10:55:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x1000000000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000200), 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x0, 0x5, @dev={0xfe, 0x80, [0x20000380, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000b80)={'team_slave_0\x00', 0x2011}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000002c0)='cpuacct.stat\x00'}, 0x30) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000300)) close(r0) recvmsg(r1, &(0x7f00000009c0)={&(0x7f00000003c0)=@nfc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/3, 0x3}, {&(0x7f0000000680)=""/48, 0x30}, {&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/82, 0x52}], 0x4, &(0x7f0000000940)=""/94, 0x5e, 0x7fff}, 0x40000000) 10:55:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) [ 321.249497] binder: 11100:11104 BC_INCREFS_DONE node 7 has no pending increfs request 10:55:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000440)=@in6={0xa, 0x0, 0x0, @remote, 0x20}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000001c00)}, 0x20000801) 10:55:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) [ 321.971003] binder_alloc: binder_alloc_mmap_handler: 11100 20001000-20004000 already mapped failed -16 [ 322.001745] binder: BINDER_SET_CONTEXT_MGR already set [ 322.029271] binder: 11100:11128 ioctl 40046207 0 returned -16 [ 322.065284] binder_alloc: 11100: binder_alloc_buf, no vma [ 322.103477] binder: 11100:11104 transaction failed 29189/-3, size 24-8 line 2973 [ 322.147044] binder: 11100:11129 BC_INCREFS_DONE u0000000000000000 no match [ 322.539799] binder: send failed reply for transaction 6 to 11100:11101 [ 322.546980] binder: undelivered TRANSACTION_COMPLETE [ 322.552293] binder: undelivered TRANSACTION_ERROR: 29189 10:55:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000600)='threaded\x00', 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x541b, 0x706000) 10:55:55 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) 10:55:55 executing program 3: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0xffffffc5) 10:55:55 executing program 4: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x20000802, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 10:55:55 executing program 1: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300), &(0x7f0000000180)) getpriority(0x1, 0x0) 10:55:55 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:55 executing program 4: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 10:55:55 executing program 0: [ 324.177506] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:56 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:56 executing program 0: 10:55:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) [ 324.218445] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:56 executing program 0: 10:55:56 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) [ 324.315838] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 324.437749] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:56 executing program 3: 10:55:56 executing program 0: 10:55:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:56 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) [ 324.979391] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:56 executing program 4: 10:55:56 executing program 1: 10:55:56 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:55:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:56 executing program 0: 10:55:56 executing program 3: 10:55:57 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:57 executing program 1: 10:55:57 executing program 3: 10:55:57 executing program 0: 10:55:57 executing program 2: 10:55:57 executing program 4: 10:55:57 executing program 1: [ 325.299427] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:57 executing program 0: 10:55:57 executing program 2: 10:55:57 executing program 3: 10:55:57 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:57 executing program 4: 10:55:57 executing program 1: 10:55:57 executing program 2: 10:55:57 executing program 4: 10:55:57 executing program 0: 10:55:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) [ 325.534973] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:55:57 executing program 3: 10:55:57 executing program 1: 10:55:57 executing program 4: 10:55:57 executing program 2: 10:55:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:57 executing program 3: 10:55:57 executing program 0: 10:55:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:57 executing program 1: 10:55:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') 10:55:57 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)}, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 10:55:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) acct(&(0x7f0000000080)='./file0\x00') 10:55:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000440)=""/197) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000040)=""/102) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000180)) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x89b1, &(0x7f0000000140)={'veth1_to_team\x00'}) 10:55:57 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6272696467653000000100"}) timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00', 0x1fff}) 10:55:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') 10:55:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$setperm(0x5, 0x0, 0x0) 10:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) 10:55:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) 10:55:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x541b, 0x706000) [ 326.097827] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.105118] bridge0: port 1(bridge_slave_0) entered disabled state 10:55:58 executing program 5: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x2, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\fc'], 0x0, 0x0, &(0x7f0000000340)}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040), 0x0, &(0x7f0000000100)={0x0, r1+10000000}, &(0x7f0000000140), 0x8) 10:55:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)="2e2f66696c65ffff", &(0x7f0000000000)=ANY=[], &(0x7f0000001ffc), 0x1400) 10:55:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x24100) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 10:55:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="421e9114516d4a838fc3059266fa170e288efe205f36906f37f08a2db6", 0x1d) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000f401, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0xe803000000000000]}, 0x10) shutdown(r0, 0x1) 10:55:58 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f0000000000)=""/105, 0xff8e) [ 326.644780] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.651233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.658017] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.664446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.676055] device bridge0 entered promiscuous mode [ 326.682958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 10:55:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) readlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0) [ 326.725517] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.732081] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.787867] device bridge0 left promiscuous mode 10:55:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 10:55:58 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f0000000000)=""/105, 0xff8e) 10:55:58 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x0, 0x1}, 0x20) 10:55:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 10:55:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f00000002c0), 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x420141042, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, &(0x7f0000d83ff8), 0x2008000fffffffe) 10:55:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001900), 0x0, &(0x7f0000000080)={[{@gid={'gid'}}]}) [ 326.947713] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.954189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.960864] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.967294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.974364] device bridge0 entered promiscuous mode [ 326.979927] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 10:55:58 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'user.', '\x00'}, &(0x7f0000000680)=""/4096, 0x1000) 10:55:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000004bfa30000000000000703000001feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000040)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000140)=""/41}, 0x28) [ 327.153251] ISOFS: Unable to identify CD-ROM format. 10:55:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) 10:55:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_sctp(0x2, 0x0, 0x84) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f00006c4f60)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r1, &(0x7f0000805000), 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) sendmmsg$alg(r1, &(0x7f0000000880)=[{0x0, 0x0, &(0x7f0000000800)}], 0x1, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r2, &(0x7f0000000000)=""/253, 0xfd) 10:55:59 executing program 5: 10:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="954e94ba0000000008001b0000000000"], 0x1}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bond_slave_0\x00'}) [ 327.324756] ISOFS: Unable to identify CD-ROM format. 10:55:59 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000080)="4f577cc14d7409bd34a4ad766c57bc3d48f4bc635d3403af84fb626b7903c9fd1d575e1d3dc02b91f70019ca9a22bd0d80a2138bb32e5fd52724d3e344c1ad9cb52149e853c9e140eef644f18e5df4d9e74ecb47fa8b75", 0x57) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r5, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ptrace(0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r3, 0x402, 0xb) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000740)='threaded\x00', 0x5) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23, 0x9, @mcast1, 0x1}, 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) 10:55:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x525}, 0xfffffffffffffdab) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000300)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0x12) truncate(&(0x7f0000000200)='./file0\x00', 0x7fff) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) 10:55:59 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) 10:55:59 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x84) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x18, r0, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x8000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xa48204) r3 = open(&(0x7f0000000180)='./bus\x00', 0x84c00, 0x6) clone(0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000000), &(0x7f0000000200)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000340)) pread64(r3, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) 10:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="954e94ba0000000008001b0000000000"], 0x1}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bond_slave_0\x00'}) 10:55:59 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000440), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680), &(0x7f0000000380)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 10:55:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) rmdir(&(0x7f0000000000)='./control\x00') 10:55:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:55:59 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000580)={{0x0, 0x0, 0x0, 0x8001}, 'syz0\x00', 0x12}) accept(0xffffffffffffffff, &(0x7f0000000440)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x80) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5b5c2efe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x807, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)={0x3b, 0x0, "081fdee9cf2fc8d1f1650ae211446359f2e7da2d89fee3d5b6a58710dd57d1dc53f4bd9704e6925ccd1be0da803a0477bef2de"}, 0x801) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x0, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=@raw, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1}, 0x48) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000003c0)) close(0xffffffffffffffff) 10:55:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) [ 328.472227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:56:00 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000080)="4f577cc14d7409bd34a4ad766c57bc3d48f4bc635d3403af84fb626b7903c9fd1d575e1d3dc02b91f70019ca9a22bd0d80a2138bb32e5fd52724d3e344c1ad9cb52149e853c9e140eef644f18e5df4d9e74ecb47fa8b75", 0x57) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r5, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ptrace(0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r3, 0x402, 0xb) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000740)='threaded\x00', 0x5) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23, 0x9, @mcast1, 0x1}, 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) 10:56:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="954e94ba0000000008001b0000000000"], 0x1}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bond_slave_0\x00'}) 10:56:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000015d400300000000003506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)="505c881c"}, 0x48) 10:56:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x0, &(0x7f0000001540)=ANY=[], &(0x7f0000000200)='syzkaller\x00'}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'lo\x00', 0x12}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000340)="6c6f00966fd651b159a9c84a2c60d29800000020") 10:56:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:00 executing program 4: socket$inet(0x2, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6_dccp(0xa, 0x6, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) r1 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffffffffd, &(0x7f00000008c0)=';') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}}}, &(0x7f0000000200)=0xe8) sendto$llc(r1, &(0x7f0000001240), 0x2d3, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x7530}, 0x2c5) connect$llc(r1, &(0x7f0000000740)={0x1a, 0x339, 0x8001, 0x6, 0x4, 0x3, @dev={[], 0xb}}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0xfe80}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000480)) 10:56:00 executing program 0: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000040)="1f0000000209fffffd3b54c007110000f30501000b000200000000000000cf", 0x1f) 10:56:00 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10}, 0x10) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ioprio_set$pid(0x1, 0x0, 0x2000) sync() open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 10:56:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) [ 328.805564] __nla_parse: 14 callbacks suppressed [ 328.805577] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. [ 328.826692] audit: type=1804 audit(1542106560.679:35): pid=11518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 10:56:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42400) [ 328.882996] audit: type=1804 audit(1542106560.729:36): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 328.964605] audit: type=1804 audit(1542106560.729:37): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 329.022031] audit: type=1804 audit(1542106560.729:38): pid=11518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 329.086831] audit: type=1804 audit(1542106560.769:39): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 329.111113] audit: type=1804 audit(1542106560.769:40): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 329.136664] audit: type=1804 audit(1542106560.769:41): pid=11527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/124/bus" dev="sda1" ino=17057 res=1 [ 329.267958] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:56:01 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000080)="4f577cc14d7409bd34a4ad766c57bc3d48f4bc635d3403af84fb626b7903c9fd1d575e1d3dc02b91f70019ca9a22bd0d80a2138bb32e5fd52724d3e344c1ad9cb52149e853c9e140eef644f18e5df4d9e74ecb47fa8b75", 0x57) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r5, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ptrace(0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r3, 0x402, 0xb) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000740)='threaded\x00', 0x5) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23, 0x9, @mcast1, 0x1}, 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) 10:56:01 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000100), 0x80000000, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) tkill(r0, 0x12) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r1, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) 10:56:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000040)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}) 10:56:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) read(r1, &(0x7f0000000000)=""/108, 0x6c) 10:56:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x223}, @local, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) [ 329.921620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:56:01 executing program 4: getitimer(0x1, &(0x7f0000000140)) 10:56:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)="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"}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'lo\x00', 0x12}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000340)="6c6f00966fd651b159a9c84a2c60d29800000020") 10:56:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x223}, @local, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 10:56:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000ba6000)={0x2, 0x4e20, @loopback}, 0x10) 10:56:01 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0505350, &(0x7f00000002c0)={{}, 'port1\x00'}) [ 330.207151] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 330.248761] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:56:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000240)={0x3, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}) 10:56:04 executing program 3: 10:56:04 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1d}, 0x1c) 10:56:04 executing program 4: unlink(&(0x7f0000000280)='./file0\x00') symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 10:56:04 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) getgroups(0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xee01]) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='fuse\x00', 0x2000000, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) 10:56:04 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 10:56:04 executing program 1: 10:56:04 executing program 4: 10:56:04 executing program 1: 10:56:04 executing program 3: 10:56:04 executing program 2: 10:56:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x0, 0x7417}) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006) ioctl$TCFLSH(r1, 0x540b, 0x0) 10:56:04 executing program 5: 10:56:04 executing program 4: 10:56:04 executing program 3: 10:56:04 executing program 2: 10:56:04 executing program 1: 10:56:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200656362286369706865725f6e756c6c2900000000000000000000000000000000000000000000000000000000000000000000000000000000000000003417000000000000"], 0x1}}, 0x0) 10:56:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 10:56:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=""/126, 0x7e}) writev(r1, &(0x7f0000000080), 0x1a6) 10:56:04 executing program 5: accept4$unix(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x6e, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[], 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) sendfile(r0, r1, 0x0, 0xa5cc54d) 10:56:04 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r0, 0x0) readv(r1, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 332.875768] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 [ 332.907293] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 [ 333.013920] audit: type=1804 audit(1542106564.859:42): pid=11644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir965005924/syzkaller.7bxkol/189/bus" dev="sda1" ino=17058 res=1 10:56:05 executing program 0: 10:56:05 executing program 2: 10:56:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:05 executing program 3: 10:56:05 executing program 1: 10:56:05 executing program 3: 10:56:05 executing program 1: [ 333.252120] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 10:56:05 executing program 2: 10:56:05 executing program 0: 10:56:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 333.465187] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 [ 333.796485] audit: type=1804 audit(1542106565.649:43): pid=11677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir965005924/syzkaller.7bxkol/189/bus" dev="sda1" ino=17058 res=1 10:56:05 executing program 2: 10:56:05 executing program 3: 10:56:05 executing program 1: 10:56:05 executing program 0: 10:56:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 333.826006] audit: type=1804 audit(1542106565.679:44): pid=11644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir965005924/syzkaller.7bxkol/189/bus" dev="sda1" ino=17058 res=1 [ 333.858972] syz-executor5 (11649) used greatest stack depth: 13496 bytes left 10:56:05 executing program 5: accept4$unix(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x6e, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[], 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) sendfile(r0, r1, 0x0, 0xa5cc54d) 10:56:05 executing program 2: 10:56:05 executing program 0: 10:56:05 executing program 3: [ 333.927736] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 10:56:05 executing program 1: 10:56:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 333.990161] audit: type=1804 audit(1542106565.839:45): pid=11686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir965005924/syzkaller.7bxkol/190/bus" dev="sda1" ino=17081 res=1 10:56:05 executing program 2: 10:56:05 executing program 3: 10:56:06 executing program 1: 10:56:06 executing program 0: 10:56:06 executing program 2: 10:56:06 executing program 3: 10:56:06 executing program 1: 10:56:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:06 executing program 0: 10:56:06 executing program 3: 10:56:06 executing program 5: 10:56:06 executing program 2: 10:56:06 executing program 3: 10:56:06 executing program 1: 10:56:06 executing program 2: 10:56:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/raw\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}], 0x1) 10:56:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:06 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x200001c0, 0x200001c0, 0x200001c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x78) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 10:56:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$packet(0x11, 0x200000000000002, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa510100ed8400dc4e92000028000043da7689b340bc57d66b88e6cee05dbc000000009078ac141400ac94"], &(0x7f0000000040)) 10:56:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) socket$packet(0x11, 0x0, 0x300) 10:56:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, r0, 0xb) 10:56:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) [ 335.091063] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:56:07 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 5: socketpair$unix(0x1, 0x4000000080002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)='+-,\x00', 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x30, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:56:07 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$link(0x8, 0x0, 0x0) [ 335.169382] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:56:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00') sendfile(r0, r0, &(0x7f0000000080)=0x8000000, 0x8) 10:56:07 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x126, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000200)='\x00', 0x0) fsync(r1) 10:56:07 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 3: clone(0x1084262d00, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) membarrier(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000500), 0x0, [{}]}, 0x88) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000180)=0x78) setitimer(0x2, &(0x7f00000000c0)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000100)) 10:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) 10:56:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000100)={@rand_addr, @broadcast}, 0xc) connect$unix(r2, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 10:56:07 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/11, 0x5d3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) clone(0x1102001bfc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x14, 0x0, &(0x7f0000000180)}) 10:56:07 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0xe6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) clone(0x1102001bfc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000180)) 10:56:07 executing program 3: r0 = memfd_create(&(0x7f0000000000)='-\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$P9_RREADDIR(r0, &(0x7f0000000440)={0xb}, 0xb) [ 335.472417] kernel msg: ebtables bug: please report to author: Wrong nr of counters 10:56:07 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000003c0)) 10:56:07 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 10:56:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x31) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 10:56:07 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:07 executing program 3: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300), &(0x7f0000000180)) socketpair$unix(0x1, 0x100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x1, 0x0) 10:56:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 10:56:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[{0x10}], 0x10}, 0x0) 10:56:08 executing program 0: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)) shutdown(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000004c0)) gettid() capset(&(0x7f0000000340), &(0x7f0000000480)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:56:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x0) 10:56:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000380)=""/206}, 0x48) 10:56:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 336.476754] protocol 2cea is buggy, dev gre0 [ 336.509773] protocol 2cea is buggy, dev gre0 10:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) 10:56:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty={[0xe00000000000000]}}, 0x1c) shutdown(r1, 0x0) [ 336.533087] protocol 2cea is buggy, dev gre0 10:56:08 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x20, 0x80200) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0xa100) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e23, 0x6, @local, 0x5}}, 0x0, 0x0, 0x0, "9a83c79edf6d50e1b1f2530dfe005da163522e261891f764d4fba0646c66add5ade56f9fb7656f97d268c7653ad7566bb61c7cd2639ec6e8c6cd926ef82c508ba1ac2d2e7b2e11f680315b795df7ebef"}, 0xd8) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0x8) socket$inet(0x2, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000200)={0x1, 0x0, [0x1, 0x10001, 0xdc73, 0x800, 0x40, 0x9]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000600)=ANY=[]}], 0x1, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0xffffffffffffff41, @mcast2, 0x4}, 0x1c) mmap$perf(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000009, 0x8010, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000480)={{0x2, 0x0, @multicast2}, {0x6, @local}, 0x0, {0x2, 0x0, @multicast2}, 'veth1_to_bridge\x00'}) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) [ 336.594343] protocol 2cea is buggy, dev gre0 [ 336.603175] protocol 2cea is buggy, dev gre0 [ 336.630835] protocol 2cea is buggy, dev gre0 10:56:08 executing program 0: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = inotify_init1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) mknod$loop(&(0x7f0000000080)='./control/file0\x00', 0x1488, 0xffffffffffffffff) [ 336.648163] protocol 2cea is buggy, dev gre0 [ 336.662099] protocol 2cea is buggy, dev gre0 [ 336.687218] protocol 2cea is buggy, dev gre0 [ 336.708001] protocol 2cea is buggy, dev gre0 10:56:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/181, 0xb5}], 0x1, 0x3ffffffffffe) 10:56:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:56:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:08 executing program 1: syz_mount_image$iso9660(&(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001900), 0x0, &(0x7f00000019c0)={[], [{@obj_type={'obj_type', 0x3d, 'gretap0\x00'}}]}) syz_mount_image$vfat(&(0x7f0000002640)='vfat\x00', &(0x7f0000002680)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000002840)={[{@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@measure='measure'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfsroot={'smackfsroot', 0x3d, 'ppp1\\'}}, {@smackfshat={'smackfshat', 0x3d, 'nocompress'}}, {@subj_user={'subj_user'}}]}) 10:56:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 337.105691] EXT4-fs (loop0): unsupported inode size: 0 [ 337.207372] FAT-fs (loop1): Unrecognized mount option "measure" or missing value 10:56:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=@ipv6_newroute={0x1c, 0x18, 0x501, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 10:56:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000380)=""/206}, 0x48) 10:56:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) [ 337.601979] EXT4-fs (loop0): unsupported inode size: 0 10:56:09 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x20, 0x80200) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0xa100) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e23, 0x6, @local, 0x5}}, 0x0, 0x0, 0x0, "9a83c79edf6d50e1b1f2530dfe005da163522e261891f764d4fba0646c66add5ade56f9fb7656f97d268c7653ad7566bb61c7cd2639ec6e8c6cd926ef82c508ba1ac2d2e7b2e11f680315b795df7ebef"}, 0xd8) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0x8) socket$inet(0x2, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000200)={0x1, 0x0, [0x1, 0x10001, 0xdc73, 0x800, 0x40, 0x9]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000600)=ANY=[]}], 0x1, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0xffffffffffffff41, @mcast2, 0x4}, 0x1c) mmap$perf(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000009, 0x8010, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000480)={{0x2, 0x0, @multicast2}, {0x6, @local}, 0x0, {0x2, 0x0, @multicast2}, 'veth1_to_bridge\x00'}) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) 10:56:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') sendfile(r0, r1, &(0x7f0000000040)=0x78010e08, 0x8001) 10:56:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 10:56:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:09 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x20, 0x80200) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0xa100) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e23, 0x6, @local, 0x5}}, 0x0, 0x0, 0x0, "9a83c79edf6d50e1b1f2530dfe005da163522e261891f764d4fba0646c66add5ade56f9fb7656f97d268c7653ad7566bb61c7cd2639ec6e8c6cd926ef82c508ba1ac2d2e7b2e11f680315b795df7ebef"}, 0xd8) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0x8) socket$inet(0x2, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000200)={0x1, 0x0, [0x1, 0x10001, 0xdc73, 0x800, 0x40, 0x9]}) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{&(0x7f000000a000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000600)=ANY=[]}], 0x1, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0xffffffffffffff41, @mcast2, 0x4}, 0x1c) mmap$perf(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000009, 0x8010, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000480)={{0x2, 0x0, @multicast2}, {0x6, @local}, 0x0, {0x2, 0x0, @multicast2}, 'veth1_to_bridge\x00'}) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000400)=0x4, 0x4) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) [ 337.894240] EXT4-fs (loop0): unsupported inode size: 0 10:56:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') preadv(r0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000380)=""/154, 0x9a}], 0x2, 0x0) 10:56:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) [ 338.227011] EXT4-fs (loop0): unsupported inode size: 0 10:56:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000380)=""/206}, 0x48) 10:56:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000a80)=@in={0x2, 0x2, @rand_addr}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1000000001000000247b2600"], 0xc}}], 0x1, 0x0) 10:56:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:10 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) set_mempolicy(0x3, &(0x7f00000000c0)=0x5, 0x9) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @rand_addr}}) 10:56:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 338.913377] EXT4-fs (loop0): unsupported inode size: 0 10:56:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:10 executing program 1: syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x9}, {0x6}]}) fstat(0xffffffffffffffff, &(0x7f0000000140)) 10:56:11 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0xffffffffffffff01, 0x0) 10:56:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000380)=""/206}, 0x48) 10:56:11 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:11 executing program 1: 10:56:11 executing program 2: 10:56:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:11 executing program 2: 10:56:11 executing program 1: [ 339.769084] EXT4-fs (loop0): unsupported inode size: 0 10:56:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:11 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:11 executing program 2: [ 340.018378] EXT4-fs (loop0): unsupported inode size: 0 10:56:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:12 executing program 2: 10:56:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x24020400) fstatfs(r0, &(0x7f0000000000)=""/4096) 10:56:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:12 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 340.618118] EXT4-fs (loop0): unsupported inode size: 0 10:56:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 10:56:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000003700)) 10:56:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:12 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 340.921514] EXT4-fs (loop0): unsupported inode size: 0 10:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) 10:56:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fec", 0x5, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080), 0x1c) 10:56:13 executing program 1: socketpair$unix(0x1, 0x2000000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000000100)=0x3, 0x4) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffffffffffceb, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f00000001c0)=@nl=@proc, 0x80, &(0x7f0000000c00), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) 10:56:13 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fec", 0x5, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:13 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 341.471368] EXT4-fs (loop0): unsupported inode size: 0 10:56:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000540), &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000600)='|', &(0x7f0000000180)=""/92}, 0x18) 10:56:13 executing program 1: clone(0x1008103, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)}, 0x10) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x2, 0x218, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x290) 10:56:13 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) [ 341.591616] net_ratelimit: 1526 callbacks suppressed [ 341.591699] protocol 2cea is buggy, dev gre0 10:56:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fec", 0x5, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 341.747407] protocol 2cea is buggy, dev gre0 [ 341.767486] protocol 2cea is buggy, dev gre0 [ 341.769275] EXT4-fs (loop0): unsupported inode size: 0 [ 341.789351] protocol 2cea is buggy, dev gre0 [ 341.804554] protocol 2cea is buggy, dev gre0 [ 341.812613] protocol 2cea is buggy, dev gre0 [ 341.820806] protocol 2cea is buggy, dev gre0 [ 341.830895] protocol 2cea is buggy, dev gre0 [ 341.839844] protocol 2cea is buggy, dev gre0 [ 341.852457] protocol 2cea is buggy, dev gre0 10:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) 10:56:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fa, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) 10:56:14 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffff", 0x8, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:14 executing program 2: mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) 10:56:14 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:14 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffff", 0x8, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:14 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 342.458563] EXT4-fs (loop0): unsupported inode size: 0 10:56:14 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:14 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000600)={&(0x7f00000003c0)=@nl=@proc, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000a00)=[{0x10, 0x1}], 0x10}, 0x0) [ 342.601877] binder: 12171:12172 BC_INCREFS_DONE u0000000000000000 no match 10:56:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 342.677454] binder: 12171:12172 Acquire 1 refcount change on invalid ref 0 ret -22 [ 342.708818] EXT4-fs (loop0): unsupported inode size: 0 10:56:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000000), 0x4) 10:56:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffff", 0x8, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:15 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@rand_addr, @dev}, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @dev}, &(0x7f00000001c0)=0xc) 10:56:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:15 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 343.338983] binder: 12196:12200 BC_INCREFS_DONE u0000000000000000 no match [ 343.361062] binder: 12196:12200 Acquire 1 refcount change on invalid ref 0 ret -22 [ 343.372831] EXT4-fs (loop0): unsupported inode size: 0 10:56:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffff", 0x9, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 10:56:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) [ 343.504858] binder: 12215:12218 BC_INCREFS_DONE u0000000000000000 no match 10:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 343.564631] binder: 12215:12218 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffff", 0x9, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 343.686675] EXT4-fs (loop0): unsupported inode size: 0 10:56:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:15 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffff", 0x9, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) [ 343.880562] binder: 12237:12243 BC_INCREFS_DONE u0000000000000000 no match [ 343.903751] binder: 12237:12243 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@rand_addr, @dev}, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @dev}, &(0x7f00000001c0)=0xc) 10:56:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) 10:56:15 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 344.127814] binder: 12251:12258 BC_INCREFS_DONE u0000000000000000 no match [ 344.137846] EXT4-fs (loop0): unsupported inode size: 0 10:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) [ 344.170880] binder: 12251:12258 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:16 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 344.349322] binder: 12265:12266 BC_INCREFS_DONE u0000000000000000 no match [ 344.391619] binder: 12265:12266 Acquire 1 refcount change on invalid ref 0 ret -22 [ 344.468799] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) 10:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:16 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 10:56:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@rand_addr, @dev}, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @dev}, &(0x7f00000001c0)=0xc) [ 344.769574] binder: 12285:12287 BC_INCREFS_DONE u0000000000000000 no match [ 344.806518] binder: 12285:12287 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) 10:56:16 executing program 4: [ 344.807074] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:16 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 10:56:16 executing program 4: [ 345.042456] binder: 12305:12307 BC_INCREFS_DONE u0000000000000000 no match 10:56:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x1f}}) [ 345.123812] binder: 12305:12307 Acquire 1 refcount change on invalid ref 0 ret -22 [ 345.200999] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:17 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:17 executing program 4: 10:56:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 10:56:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@rand_addr, @dev}, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @dev}, &(0x7f00000001c0)=0xc) 10:56:17 executing program 4: [ 345.671455] binder: 12325:12328 BC_INCREFS_DONE u0000000000000000 no match [ 345.704932] binder: 12325:12328 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:17 executing program 3: [ 345.716812] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:17 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:17 executing program 4: 10:56:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc008240a, 0x70effb) [ 345.953043] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 345.996181] binder: 12350:12351 BC_INCREFS_DONE u0000000000000000 no match 10:56:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340), 0x0, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc008240a, 0x70effb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x29, &(0x7f0000000280), &(0x7f00000000c0)=""/41}, 0x28) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) [ 346.058092] binder: 12350:12351 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a3000000000000000000000000000000400"}) r1 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000240)=""/116) [ 346.276295] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 346.459818] input: syz1 as /devices/virtual/input/input5 10:56:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f0000000100", 0x2b, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:18 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) munlockall() r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x803, 0x2000000000000002) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) 10:56:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@rand_addr, @dev}, 0x10) 10:56:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:56:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"6e7230010100", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x16}]}) [ 346.681371] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 346.737085] net_ratelimit: 1474 callbacks suppressed [ 346.737131] protocol 2cea is buggy, dev gre0 10:56:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f0000000100", 0x2b, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r1, &(0x7f0000000200)="0304001fecffffffffff7f006df55b0dfa938207", 0x14, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) [ 346.788579] protocol 2cea is buggy, dev gre0 [ 346.797617] protocol 2cea is buggy, dev gre0 10:56:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000180)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) [ 346.845172] protocol 2cea is buggy, dev gre0 [ 346.864856] protocol 2cea is buggy, dev gre0 [ 346.884608] protocol 2cea is buggy, dev gre0 10:56:18 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 346.915699] protocol 2cea is buggy, dev gre0 [ 346.921663] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 346.949292] protocol 2cea is buggy, dev gre0 [ 346.974198] protocol 2cea is buggy, dev gre0 [ 347.000138] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=10 10:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xe0, &(0x7f000000cf3d)=""/195}, 0x48) 10:56:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f0000000100", 0x2b, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000ef80)={0x4, 0x802, 0x0, {0x0, 0x2710}, {}, {}, 0xf, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "790eaada477f17eb046695eea58af88d0ba3b8f5ca34f33a9a82d81e455bc6ca3479893215467e3bb85ea1247aafde2b17277187bd8fc023bb972d19343108b0"}}, 0x80}}, 0x0) 10:56:19 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 10:56:19 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:19 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000ef80)={0x1, 0x802, 0x0, {0x0, 0x2710}, {}, {}, 0xf, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "790eaada477f17eb046695eea58af88d0ba3b8f5ca34f33a9a82d81e455bc6ca3479893215467e3bb85ea1247aafde2b17277187bd8fc023bb972d19343108b0"}}, 0x2000f000}}, 0x0) [ 347.639683] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendto$inet6(r0, &(0x7f0000000940), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev, 0x8}, 0x1c) [ 347.698797] binder_thread_write: 2 callbacks suppressed [ 347.698810] binder: 12444:12446 BC_INCREFS_DONE u0000000000000000 no match [ 347.716911] binder_thread_write: 2 callbacks suppressed [ 347.716927] binder: 12444:12446 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:19 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96", 0x40, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000200)={0x2}, 0x8, 0x0) r2 = dup2(r0, r0) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18}, 0x18) [ 347.919410] binder: 12457:12461 BC_INCREFS_DONE u0000000000000000 no match [ 347.921273] EXT4-fs (loop0): #blocks per group too big: 4076871680 [ 347.984088] binder: 12457:12461 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96", 0x40, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:20 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000700), 0x24, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) 10:56:20 executing program 4: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 10:56:20 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(r0, r1) [ 348.436337] binder: 12474:12482 BC_INCREFS_DONE u0000000000000000 no match [ 348.443423] binder: 12474:12482 Acquire 1 refcount change on invalid ref 0 ret -22 [ 348.469941] EXT4-fs (loop0): #blocks per group too big: 4076871680 10:56:20 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, 0xffffffffffffffff) 10:56:20 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000200)={0x2}, 0x8, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 10:56:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96", 0x40, 0x400}], 0x0, &(0x7f00000000c0)) [ 348.605109] binder: 12495:12499 BC_INCREFS_DONE u0000000000000000 no match [ 348.644305] binder: 12495:12499 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(r0, r1) 10:56:20 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 348.743668] EXT4-fs (loop0): #blocks per group too big: 4076871680 10:56:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906", 0x4b, 0x400}], 0x0, &(0x7f00000000c0)) [ 348.864270] binder: 12518:12521 BC_INCREFS_DONE u0000000000000000 no match [ 348.893714] binder: 12518:12521 Acquire 1 refcount change on invalid ref 0 ret -22 [ 349.018950] EXT4-fs (loop0): #blocks per group too big: 4076871680 10:56:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fd\x00') getdents64(r1, &(0x7f0000001380)=""/4096, 0x1000) fcntl$notify(r1, 0x402, 0x400000000000031) exit(0x0) getdents64(r1, &(0x7f0000000040)=""/57, 0xfffffffffffffee7) 10:56:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)="e91f7189591e9233614b00", 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000003c0), 0x4) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000180)) 10:56:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(r0, r1) 10:56:21 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906", 0x4b, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 349.421957] binder: 12548:12553 BC_INCREFS_DONE u0000000000000000 no match [ 349.447959] binder: 12548:12553 Acquire 1 refcount change on invalid ref 0 ret -22 [ 349.449180] EXT4-fs (loop0): #blocks per group too big: 4076871680 10:56:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(0xffffffffffffffff, r0) 10:56:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906", 0x4b, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:21 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:21 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(0xffffffffffffffff, r0) [ 349.621536] EXT4-fs (loop0): #blocks per group too big: 4076871680 [ 349.636782] binder: 12569:12575 BC_INCREFS_DONE u0000000000000000 no match 10:56:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 349.673336] binder: 12569:12575 Acquire 1 refcount change on invalid ref 0 ret -22 10:56:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8c", 0x50, 0x400}], 0x0, &(0x7f00000000c0)) [ 349.878921] EXT4-fs (loop0): invalid first ino: 0 10:56:22 executing program 3: 10:56:22 executing program 4: 10:56:22 executing program 2: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(r0, 0xffffffffffffffff) 10:56:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8c", 0x50, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:22 executing program 3: 10:56:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:22 executing program 1: [ 350.426696] EXT4-fs (loop0): invalid first ino: 0 10:56:22 executing program 3: 10:56:22 executing program 2: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) 10:56:22 executing program 4: 10:56:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8c", 0x50, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:22 executing program 1: 10:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:22 executing program 3: 10:56:22 executing program 4: 10:56:22 executing program 2: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000005c0)={0x1c, 0x0, &(0x7f0000000600)=[@increfs_done, @acquire], 0x0, 0x0, &(0x7f0000000500)}) [ 350.678758] EXT4-fs (loop0): invalid first ino: 0 10:56:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8", 0x53, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:22 executing program 1: 10:56:22 executing program 3: 10:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x14, 0x0, &(0x7f0000000600)=[@increfs_done], 0x0, 0x0, &(0x7f0000000500)}) 10:56:22 executing program 4: 10:56:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000540)={{}, {0x0, @dev}, 0x0, {0x2, 0x0, @local}}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @remote}}}, 0x90) [ 350.936765] EXT4-fs (loop0): invalid first ino: 0 10:56:22 executing program 3: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f0000000180)=""/27, 0x1b) [ 351.000214] binder: 12656:12659 BC_INCREFS_DONE u0000000000000000 no match 10:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:22 executing program 4: fchdir(0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000200)={0x0, r0+10000000}) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) 10:56:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8", 0x53, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:23 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000500)}) 10:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000480), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000005c0), 0x4, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[]}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x0, 0xc91}], 0x1) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000200)={0x10004, 0x0, &(0x7f0000010000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 351.226386] audit: type=1804 audit(1542106583.079:46): pid=12675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir124698575/syzkaller.E0q0pA/254/bus" dev="sda1" ino=17239 res=1 [ 351.281593] EXT4-fs (loop0): invalid first ino: 0 10:56:23 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000500)}) 10:56:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8", 0x53, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 351.540870] EXT4-fs (loop0): invalid first ino: 0 10:56:23 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000500)}) 10:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d895", 0x54, 0x400}], 0x0, &(0x7f00000000c0)) [ 351.865738] EXT4-fs (loop0): invalid first ino: 0 [ 351.974755] audit: type=1804 audit(1542106583.819:47): pid=12693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir124698575/syzkaller.E0q0pA/254/bus" dev="sda1" ino=17239 res=1 10:56:23 executing program 4: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x6c, &(0x7f0000000280), &(0x7f0000000540)=0x8) 10:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 352.036480] audit: type=1804 audit(1542106583.859:48): pid=12675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir124698575/syzkaller.E0q0pA/254/bus" dev="sda1" ino=17239 res=1 10:56:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000001580)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6558, 0x8}}}}}, 0x0) 10:56:24 executing program 3: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 10:56:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d895", 0x54, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa347991907000000000000005e44573eef5fd0f423a5cfb386e4cc997c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e682e3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000e70da2fbe1595f24f3f202ebcb7774bb5dc9a4bdcc24ef5fe2d20b0012352c8536e5f07e7ccc9b973570123f8abef5118b2488a804b6fe27f839d17fa637636c6ba3b2b4fbfdd348f276c71576fbf514d52f72b29e83f07da15ec5da20d84d47907ca11c3c4944207ddcd90bcd238ab5391ebc7bee5562864794fa504ce1cc4eb26ff2040ef99dd2d4d29fd96ce9822c323db0cc4078f7d4de83e5bfc6b2f2543407f1bc4531acf7") pread64(r0, &(0x7f0000000080), 0xff7c, 0x0) execveat(r0, &(0x7f0000000080)='\x00', &(0x7f0000000300), &(0x7f0000000500), 0x1000) 10:56:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 10:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 352.314589] audit: type=1804 audit(1542106584.169:49): pid=12745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/186/bus" dev="sda1" ino=17259 res=1 [ 352.317178] EXT4-fs (loop0): invalid first ino: 0 10:56:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000230000006a0a00fe000000008500000017000000b7000000000000009500000800000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xe, &(0x7f0000000540)="0413607c8e8fe24f78b1a48329ab", &(0x7f0000000580)=""/14}, 0x28) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000100)={0x0, 0x0, "a48d7d884b50981143ca49a95d33b47bd59c3b4d4f79a7e19d0db86402e1eeb7", 0x0, 0x0, 0x101}) 10:56:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d895", 0x54, 0x400}], 0x0, &(0x7f00000000c0)) 10:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0x0, 0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000840)="bc1f302f7501b4f3003add8bc18d2d8125f6087e37e00becb2f8f85777b9f52b3f7f4798b9f2416e34059b9820ae710c5b32f47a8ec9285d8d5cbe4cfbbceab2a833717bb75c69dabb5b2560b3d41e23fc0596e9a0ee9c4cadd095f42668f2e9197d02a390", 0x65, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)="9a535b61117c83ec4741b067fbeed76b43768677c42d69924fc076a9b521ec20132f59f10f8ac3a1c623fe7263a155b22bed5f51e1451aae8c273d957f6d13b9c6878b01f8ea50bf21243be75aadfda35a9427409e6598fc97cc8fc5563a76784472831e5fde214ae988aee5021d3d2984b299d41907cb52c6e4ec2c3a115277b5530c23385ae666307aa55a2656809989a32db8460f3f550f11c186bb0765ada847f7b30b", 0xa5, 0x0) keyctl$link(0x8, r1, r2) poll(&(0x7f0000000800)=[{}], 0x1, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCSCTTY(r4, 0x540e, 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x2, 0x1a}, 0x20) [ 352.670452] EXT4-fs (loop0): invalid first ino: 0 [ 352.767653] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 352.813670] minix_free_inode: bit 1 already cleared [ 353.101112] audit: type=1804 audit(1542106584.949:50): pid=12791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/186/bus" dev="sda1" ino=17259 res=1 [ 353.140898] audit: type=1804 audit(1542106584.979:51): pid=12793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir050812878/syzkaller.IDmku1/186/bus" dev="sda1" ino=17259 res=1 [ 353.183090] syz-executor3 (12745) used greatest stack depth: 13480 bytes left 10:56:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 10:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55}], 0x0, &(0x7f00000000c0)) 10:56:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0x0, 0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000840)="bc1f302f7501b4f3003add8bc18d2d8125f6087e37e00becb2f8f85777b9f52b3f7f4798b9f2416e34059b9820ae710c5b32f47a8ec9285d8d5cbe4cfbbceab2a833717bb75c69dabb5b2560b3d41e23fc0596e9a0ee9c4cadd095f42668f2e9197d02a390", 0x65, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)="9a535b61117c83ec4741b067fbeed76b43768677c42d69924fc076a9b521ec20132f59f10f8ac3a1c623fe7263a155b22bed5f51e1451aae8c273d957f6d13b9c6878b01f8ea50bf21243be75aadfda35a9427409e6598fc97cc8fc5563a76784472831e5fde214ae988aee5021d3d2984b299d41907cb52c6e4ec2c3a115277b5530c23385ae666307aa55a2656809989a32db8460f3f550f11c186bb0765ada847f7b30b", 0xa5, 0x0) keyctl$link(0x8, r1, r2) poll(&(0x7f0000000800)=[{}], 0x1, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCSCTTY(r4, 0x540e, 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x2, 0x1a}, 0x20) 10:56:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1f, 0x40b, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000040)=""/2}, 0x18) [ 353.373735] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 353.384312] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f00000000c0)=0x100) 10:56:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000200)={0x77, 0x0, [0x4b564d01, 0x0, 0xc0010007]}) 10:56:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55}], 0x0, &(0x7f00000000c0)) [ 353.519029] MINIX-fs: mounting unchecked file system, running fsck is recommended 10:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0), &(0x7f00000003c0)=0xa) [ 353.724672] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 353.815015] minix_free_inode: bit 1 already cleared 10:56:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00'}) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) fcntl$getown(r0, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000006c0)={0x0, 0x0, 0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000840)="bc1f302f7501b4f3003add8bc18d2d8125f6087e37e00becb2f8f85777b9f52b3f7f4798b9f2416e34059b9820ae710c5b32f47a8ec9285d8d5cbe4cfbbceab2a833717bb75c69dabb5b2560b3d41e23fc0596e9a0ee9c4cadd095f42668f2e9197d02a390", 0x65, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000740)='big_key\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)="9a535b61117c83ec4741b067fbeed76b43768677c42d69924fc076a9b521ec20132f59f10f8ac3a1c623fe7263a155b22bed5f51e1451aae8c273d957f6d13b9c6878b01f8ea50bf21243be75aadfda35a9427409e6598fc97cc8fc5563a76784472831e5fde214ae988aee5021d3d2984b299d41907cb52c6e4ec2c3a115277b5530c23385ae666307aa55a2656809989a32db8460f3f550f11c186bb0765ada847f7b30b", 0xa5, 0x0) keyctl$link(0x8, r1, r2) poll(&(0x7f0000000800)=[{}], 0x1, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCSCTTY(r4, 0x540e, 0x1ff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x2, 0x1a}, 0x20) 10:56:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="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") clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) pread64(r0, &(0x7f0000000080), 0xff7c, 0x0) execveat(r0, &(0x7f0000000080)='\x00', &(0x7f0000000300), &(0x7f0000000500), 0x1000) 10:56:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0001000000ff000000010000c9030000ec000000010008000000000000000000002000f3ff1f000000010000000000006e5fbe5c0000ffff53ef796f367afe96b05531d4d3566f02e06906ad6f6cac8cdc31d8958a", 0x55}], 0x0, &(0x7f00000000c0)) 10:56:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0x4e20, @loopback}, 0x10) 10:56:26 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x103) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socket(0x0, 0x0, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 10:56:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000003540)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, &(0x7f0000001840)=""/165, 0xa5}}, {{&(0x7f0000001540), 0x80, &(0x7f0000002040)}}], 0x301, 0x0, &(0x7f0000002500)={0x77359400}) [ 354.326819] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 10:56:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 354.392067] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 354.460347] minix_free_inode: bit 1 already cleared 10:56:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) writev(r1, &(0x7f0000002680)=[{&(0x7f0000000300)="698c0765b3753bad2423bb316d15b0cd187c1101d827e0212b40e3d135e886eb1c6a42c1c7bdfc2c7e19d209e061d8a1d7f586432533446ed1faca8ab66966adaec77903bfb1f3f3a50185ad5c716f153c83584e306a177a172a6203afad6eba7520369c481116b995456e6f276f8bb32b2aaa4d0c7eb664769fa9e4c4dd15ca08ae6bedfe3b46375a020663e728dc598e7ff675ae6cce22193d31cfc9c961f4db590af0e921ea3f793c1d2038c67a6cd179e72d2edbc44815f98bce2948b1655bf243e2346c71e65456a09d43293b1a3ec92d385b73de49d17a414c064f9b635822465a3eed5f9dabb58b3c0dfbae2e78dbec3654bd5d2cd13edd1a3defd72624177c24e214382c475562a44dc2a9b3182583b802a35eb6d24f0b29abd8df49ba43ed306c86939bb117666f78289be9a4589c7222db8a81881974b6ac70e36954b0df9cc1ebc2ccb0f36c4e5d4ad7832a13e79b9387610e62225dc86d30641f840b6688912b7df37a8c527eb369a04101260dc431ca74b53314bdf238189c40f5938d3b939df4f534f61b38ee724cd6b91f9b4a8acd1798bf216385c4a1925ef3421b57cd3cb90354d58ac45c731315289cb73cc589c94995b636fb2e6a5483b86234b1e0467fdfb2c01db35a3d5f8593a462f1045b98c9f69a897009a593774e291e480940f1583b50ee474c39103a08ecd6751445d8c0d065f08e822dd83e26881b73073ccf387bdcb20fee2d502356b0cfb948f4cf5fea69cfa8ab63b46b2cafa18992b2c8ceca7a43a85963e4465d3577f02070fd0dae317fbe039899a50023f03505f0965dfbb0cc1d9fd5c0615fbbe6e18356a6df59e2031f83f5ef401032799a11ce3585311d54cbde1dfd7d9c960c3fb0724da9345e5d88673a55bcac44e7d5812df6f3ce061e9e5410b974357bd6b26ed80bc5effe80d2a1551ffa9e33225afb7dc1bc9a45cec0f634b6cfe14c904cc2e4b6d12db6d83971ca2e88355f39ff4edc425e8e04265e6bb91e80ad62af413097abf57f5ca4e29070086834ff91602d4b92f2cbfcfd7198e5fe21f7449fcdb5d8630a966d20b710ae2dec9312dcbf96ff8552fcee852854fd99aab70eb5494fcb85e43207abdc57a093ab169a930325badb23b58a0712d1e67df2345ae8fdfd71fb99480cc749f8f4c73c69a48fb6de7f0ea8c33a6d8cb9b1c61280ec5a44f2621d679bd8cb090c76fbe478dce0c9f6bc82ee35bb8750e22da8086694ea7c3d6f8507d53d4700a4bd67b7c089c679c6430effc09aced5b00323f91548b60ab10caf7e0c43bccb0e37790e251417979d31a5bcb95c4ddd1c78d94a0e85cfb6e25d8b24dff80e3bf05b543bda48d5227740d8315d7f358ba2110c30af43236bcac39276734cf75e7608fa13133b9e43de248ddfeb9b959354dd46c188cf4a1c2e45e452132e81c1122b43f264129c6c096fdbb7df20317c2b23c356894a4fa24960481b0833e9b393a881520cecc09690ceab38a44fba0619b7252750798c985fbe83d1bd3ffb10b7655ecb1c53a2f13eeeca37ea37531483082ecf283f1aa4fbb740de0eb3c8f0ba92efed9b9c5f6181c19b98444de8b9365c9a5295479528bec51b6d58046332b39798d5b8071d7d2e063d4f8218e6a0638804c5ed387ae7e9c351bc304059d16d4aa8231c057ebcfa4769aa2fd9605ba0cf99d9c90cf69bee4410fe9fbc7cd0d20bb9e97c871fe08417e3bd4233c3ec59eed8f0d1e7878595c5e90c90ba089dc5f7ceb8749718a599c0b6607c92ea4c6e2f7c308ee9ed0d1ceae97cde6b6d37e974d8e4f5aa2a469af0017e97e2ee78f6c9fa253ef55e5f51c040086db75aa24759acf9b5c34a9d7e8bbfd6202e91556db1282eb5bb2df02e3cc42b9449324b76211f5926e2d9b9e3f2b04ecdbab093f6b6865610bc2058c9a1f960a40aef64c2b1f5c2e205ffb0a381093ccd93dc1dee533ca7fc51e6af2d06a5cda0ef2a3f59ca08b0ec294bbae399e9d0f75f163518308acc2fa0041aee2aa0865b4a62de942bc56d697cee5867f76c14f79ecd1283345d2910764a701e17af0483fae36cd29bb312b5a9d5ed58713245b9260c5efd7b14207d67035d50091eb8fb893367a9c0a6997998604ec9a3c4aaa75e90b8a0e9f1e3012ba1c9b1483fc3a4395df983e83ea245a6818b3fc1a6a3d92c4989b0c3bee669c5610ca32614e176a51edfd44a05d46d1418d69f29f19d88a343fcb454895b3cd92e146110023322178c075d68c43c6953ff0c14bb1cafc62add8729bde3a72971fe08ffc844c47d4f7cc3be3aa9eb68ad2829c7a559d981d5861a8886077e0d31a74811eb9c1270b74770c66fa64893bce7767dd93e4a1d5af544f67ef1592979c1aa79666aa70ff26fce9a77fca620d2924209b8618abeaf5ee6e6c3faedad8320ea0fa7d67ac8bf8f87a47321f8c66fd8cb32bab0f3526bb41ac96cee49594ad293b373de8b4a1d58c0f59650cc289be432638e59a1d1e12997efae8593d1f37f4a121a60f5ea002ffd03490c0ee87fe79c101af36f9c0495fdc81cc107ae3c4270d04fbf455f55fc1c9569ad3b6d89a5e52387e357143a9278cdad3ad7bcf499ad9b89368158904009f4820dfef3557ec8d517717fc50c63fb37da98532657611bf6fe37fb1b3361c7fb01a1d95253b798f80146dca76cc7738db85fe7e0c70c7aea08adc791db78ce74347fbd4157cf26d4d1c2bc41010cb421ef9d5b04c1ac15b34104d39450a66c6516d8183b0333a59c29b53761c086658521cd0d62402b5be402190694ad142098dc86dcf3ac34c46b19e4a40ea5dd7ddae11a1d49ac1f05d1d88751e37cab0ee4d21ddb72a505b52c9c44d6ea605271f17f62806c2db5d35c0314b5eb34bfbec2b41bef10bf4ce7427e2f5794b713b33260731c8532f006b4c01e766a7f7168997c2e76b183299ae10395796b6cb4fa97a98a2ba270e7f5ef423fdee048a13b397346b36f1c4362516033dedfe849e0f2e5660e2a941e301114da16b82305e7e3757cddfaa8e3a0dd9ca2112765bd118bbae70b9eb45f5abe0de2bd81c54b9cbd928dccfcf89eaca3dba6366ad4d72c22fe90bc96706c3036d704e5d4ce096a1ce62b07af03cdc1d0d0f1cafd72d7cf2949be0189390b326de1ee3287de83459f2e0c36bb8b6af3003ddb9adc1bc79ca79f5a930d9af545b0082b545b5515a3ec8129aeda30229cdf1023a5abd9c0a28dd52b465434507e1b964354c9592fede8ee268353fe70be8cbe8ed365491ba681bda2c87230aa5b8e19f9f817233eb8265458398c5dfe23c064b371e21e9a3bd487c588c18316dc0dc08ee096c42ca990e876b2c687a24b8348e311bf0ae091eabf0617a7ef67557db1551edf0fe64d2afff34f8e11302f4a0483771a4e20ce04a47d2b1a3c18b3f09ce201662481537b38f65495439983e1a264f7f7133d1849f76949c195a53936da5dfec7aaddccaf2ffd831115394147a857caf138c94144b53a515f111fc3c008cb0cfe5f39d3d0cb22115440d20433b4bd959f4f5110feff16ecfdc80554fbae046d7554e93cd1275d9ceaddc0ca1672c46d56670a37928adc2d708646d6dde3e4b7f5524526b865ed664a87d9eca8d1cea5144fbfb40eb6fb89c37e5a54c1a5c42280796ab382089a9574a6f5157572bd079df4a119994172a2e5ab63d0fb48b696ed8d2c7e0ef262382ec739437951967840e8351d29f368e2df7c5bff4e98fecf457fc8a34605ae16d7f3d6a9d3ac09ead5f2c218ad9e1c78827e17e4ef697beef78cb6b94a321b2eae43d6fab686154e6d1a1e18fd056498c57c3989c52181453f994f778b8fabd96604f7f79a69b83de7118bcfb2163e271830454a5622be10edf71facb7c19334fa42b1fd606219f272bc70c58eb8d6c1c5b49a911116713f5beaeb0fa28bcb12e59c74a930a1e56f414d810c3a62e4f30d560df7a21b57993b5fd2261ebe918c313d4817a6cfaee22acc226e70776776a055ba47cd9703558497955fe21aedb6152e715b929d40a03d48161153dd9ba7306aeca51da1c7185db2978d9ac2f04cd3084842e01fed616fae30ba533938b66c7e4654dabda55fd270d51e0c5076bbe14f3be8bedc6b631960254a60e9cd2047814f65c2cda5200d14aae96c06d7a9d680a2d849a3da5e0c91c88b4110bbddb2c520e4ba4566ac129ac4af0173b82a2068c7bdd2a932414f202a393692a753c9cd5974a9ef88974ccd5eb6cfa565cc3848608f4fda9ad95e0dc6235134ecad7012f5a29942638017f30fecfd840d6b045f377c33760d6952990334070cd58ca78ad5ab838ea0ad1a1f19313c37e6f508469855a0f9e549d105a117dc5810f09d5101081f71dcad4163a0f3399388bbb6735aeefb8b2ca3a5d6a8935ef807eb7e1a826c0a970ab5f52784e839b0798585f0350317e20e1d8067e92a1877f060d219df2626c4d6e2b4b5d5e91f41a0833e466bef25a862baaf9224e4d507da3a3a3ba4fc8d82ffecdd8313a852fa7e42c73c97c5d880d54214ae2e432adea8bd5539509d20ff3ac8ec390fd67da348e9a5eb089a3550bda79547b7eea36a5698a77b681656d07977c017c3703fe4a87f47a0762d21b2da5d8a0fe50c54eb1ee84b502d50f9cbc8916614c710566d639bf1470dac28af91d19b350c0df1621dd2e83ee8fd9db5bb4d02a2108fc4b3e63b919f8270143ccb87bea5efcb477a5ffe264d91ee775f09d341f0b258d86f8c0a334f4e616b39644e69b2292eab10544e7051046c046dca888d90e54a1e2a0aec87f3c4b30eef064c037733bf4b1da387dc92e8d71e6f7b4a7d528e07e8a904229d1b3085f5d4a600afd624456086b841d8f88d398629fee75144f207ffc2beef68ab973699ce233c34f4956685eda2afacb3e2b5669f9833f5ac3cc9061a2a7bc59d7c31bd0d61aa771cf36310b65ab568eb40e357dbb090176b66c33e192637e8e26326f3c23492d8e661245a0c05f001960539fbc6d2e77234f852122b94f469ed2876f3d42ad5232f9f0820124b1560122bc7f28f5ca36b5fe50d80aa8d3d3baffcbaa7cff60a6d2ddc46226c06af08ea142b609cd418551c5bbe71ad47974786dde1c8123967e10714038dc51cfd1d29f1e8a4cfb97b41799e27b3b87c59ada8cd38e211d61d2191c5ec57f3b6b2775d9e4841af9c206b1ca86ff73113acce75e789d004b84d4f1e696b60f99aa1739f2350f7d182e8644fc95ed9e9426eb433e788c4b3cca3bdfad750ff06ad3d0aeb17a1cda4831964b9dcce17ff7327a0e2b7fa9875bc199aded75440f67afd95a5c3a2f693ef155f4c0513a5b13998fbd3da668bba955f223c4f3bcb185460738cdef1a9f2ae1116ec8eb41ed84fcc2d985cddb9d009e796a0782330bbe9e92eb98b48762d9c160e32051cac69fcf00069ac6118b036f1eb234d8878d74234b9a4c5528a2047b721319e1b2bcaeb4d4f7f1835dd3afa5e273b29b0a9909592e874d7d7ad91a39f7ba8186b71f0600e442ad61a9836a054b14d869089d08b649795a56bee9d5ed9bf322189a03d2f4751f9cdb3840d375bc65be8f0ea562f39fa5f635fe8d9d8fa3d017742daed03cdf1c1008e895c1feb9a8e7e756e2d37b2c0b99febf58e3b5a34a344f67a0af33431ce9f2690d3f08790977927ebbb8650ba88b9d66914bf3a6c29e6c0fe44181818c52ab9779d949fec8492669a5df21291880c618f8aa1e7", 0xfd8}], 0x1) 10:56:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) writev(r1, &(0x7f0000002680)=[{&(0x7f0000000300)="698c0765b3753bad2423bb316d15b0cd187c1101d827e0212b40e3d135e886eb1c6a42c1c7bdfc2c7e19d209e061d8a1d7f586432533446ed1faca8ab66966adaec77903bfb1f3f3a50185ad5c716f153c83584e306a177a172a6203afad6eba7520369c481116b995456e6f276f8bb32b2aaa4d0c7eb664769fa9e4c4dd15ca08ae6bedfe3b46375a020663e728dc598e7ff675ae6cce22193d31cfc9c961f4db590af0e921ea3f793c1d2038c67a6cd179e72d2edbc44815f98bce2948b1655bf243e2346c71e65456a09d43293b1a3ec92d385b73de49d17a414c064f9b635822465a3eed5f9dabb58b3c0dfbae2e78dbec3654bd5d2cd13edd1a3defd72624177c24e214382c475562a44dc2a9b3182583b802a35eb6d24f0b29abd8df49ba43ed306c86939bb117666f78289be9a4589c7222db8a81881974b6ac70e36954b0df9cc1ebc2ccb0f36c4e5d4ad7832a13e79b9387610e62225dc86d30641f840b6688912b7df37a8c527eb369a04101260dc431ca74b53314bdf238189c40f5938d3b939df4f534f61b38ee724cd6b91f9b4a8acd1798bf216385c4a1925ef3421b57cd3cb90354d58ac45c731315289cb73cc589c94995b636fb2e6a5483b86234b1e0467fdfb2c01db35a3d5f8593a462f1045b98c9f69a897009a593774e291e480940f1583b50ee474c39103a08ecd6751445d8c0d065f08e822dd83e26881b73073ccf387bdcb20fee2d502356b0cfb948f4cf5fea69cfa8ab63b46b2cafa18992b2c8ceca7a43a85963e4465d3577f02070fd0dae317fbe039899a50023f03505f0965dfbb0cc1d9fd5c0615fbbe6e18356a6df59e2031f83f5ef401032799a11ce3585311d54cbde1dfd7d9c960c3fb0724da9345e5d88673a55bcac44e7d5812df6f3ce061e9e5410b974357bd6b26ed80bc5effe80d2a1551ffa9e33225afb7dc1bc9a45cec0f634b6cfe14c904cc2e4b6d12db6d83971ca2e88355f39ff4edc425e8e04265e6bb91e80ad62af413097abf57f5ca4e29070086834ff91602d4b92f2cbfcfd7198e5fe21f7449fcdb5d8630a966d20b710ae2dec9312dcbf96ff8552fcee852854fd99aab70eb5494fcb85e43207abdc57a093ab169a930325badb23b58a0712d1e67df2345ae8fdfd71fb99480cc749f8f4c73c69a48fb6de7f0ea8c33a6d8cb9b1c61280ec5a44f2621d679bd8cb090c76fbe478dce0c9f6bc82ee35bb8750e22da8086694ea7c3d6f8507d53d4700a4bd67b7c089c679c6430effc09aced5b00323f91548b60ab10caf7e0c43bccb0e37790e251417979d31a5bcb95c4ddd1c78d94a0e85cfb6e25d8b24dff80e3bf05b543bda48d5227740d8315d7f358ba2110c30af43236bcac39276734cf75e7608fa13133b9e43de248ddfeb9b959354dd46c188cf4a1c2e45e452132e81c1122b43f264129c6c096fdbb7df20317c2b23c356894a4fa24960481b0833e9b393a881520cecc09690ceab38a44fba0619b7252750798c985fbe83d1bd3ffb10b7655ecb1c53a2f13eeeca37ea37531483082ecf283f1aa4fbb740de0eb3c8f0ba92efed9b9c5f6181c19b98444de8b9365c9a5295479528bec51b6d58046332b39798d5b8071d7d2e063d4f8218e6a0638804c5ed387ae7e9c351bc304059d16d4aa8231c057ebcfa4769aa2fd9605ba0cf99d9c90cf69bee4410fe9fbc7cd0d20bb9e97c871fe08417e3bd4233c3ec59eed8f0d1e7878595c5e90c90ba089dc5f7ceb8749718a599c0b6607c92ea4c6e2f7c308ee9ed0d1ceae97cde6b6d37e974d8e4f5aa2a469af0017e97e2ee78f6c9fa253ef55e5f51c040086db75aa24759acf9b5c34a9d7e8bbfd6202e91556db1282eb5bb2df02e3cc42b9449324b76211f5926e2d9b9e3f2b04ecdbab093f6b6865610bc2058c9a1f960a40aef64c2b1f5c2e205ffb0a381093ccd93dc1dee533ca7fc51e6af2d06a5cda0ef2a3f59ca08b0ec294bbae399e9d0f75f163518308acc2fa0041aee2aa0865b4a62de942bc56d697cee5867f76c14f79ecd1283345d2910764a701e17af0483fae36cd29bb312b5a9d5ed58713245b9260c5efd7b14207d67035d50091eb8fb893367a9c0a6997998604ec9a3c4aaa75e90b8a0e9f1e3012ba1c9b1483fc3a4395df983e83ea245a6818b3fc1a6a3d92c4989b0c3bee669c5610ca32614e176a51edfd44a05d46d1418d69f29f19d88a343fcb454895b3cd92e146110023322178c075d68c43c6953ff0c14bb1cafc62add8729bde3a72971fe08ffc844c47d4f7cc3be3aa9eb68ad2829c7a559d981d5861a8886077e0d31a74811eb9c1270b74770c66fa64893bce7767dd93e4a1d5af544f67ef1592979c1aa79666aa70ff26fce9a77fca620d2924209b8618abeaf5ee6e6c3faedad8320ea0fa7d67ac8bf8f87a47321f8c66fd8cb32bab0f3526bb41ac96cee49594ad293b373de8b4a1d58c0f59650cc289be432638e59a1d1e12997efae8593d1f37f4a121a60f5ea002ffd03490c0ee87fe79c101af36f9c0495fdc81cc107ae3c4270d04fbf455f55fc1c9569ad3b6d89a5e52387e357143a9278cdad3ad7bcf499ad9b89368158904009f4820dfef3557ec8d517717fc50c63fb37da98532657611bf6fe37fb1b3361c7fb01a1d95253b798f80146dca76cc7738db85fe7e0c70c7aea08adc791db78ce74347fbd4157cf26d4d1c2bc41010cb421ef9d5b04c1ac15b34104d39450a66c6516d8183b0333a59c29b53761c086658521cd0d62402b5be402190694ad142098dc86dcf3ac34c46b19e4a40ea5dd7ddae11a1d49ac1f05d1d88751e37cab0ee4d21ddb72a505b52c9c44d6ea605271f17f62806c2db5d35c0314b5eb34bfbec2b41bef10bf4ce7427e2f5794b713b33260731c8532f006b4c01e766a7f7168997c2e76b183299ae10395796b6cb4fa97a98a2ba270e7f5ef423fdee048a13b397346b36f1c4362516033dedfe849e0f2e5660e2a941e301114da16b82305e7e3757cddfaa8e3a0dd9ca2112765bd118bbae70b9eb45f5abe0de2bd81c54b9cbd928dccfcf89eaca3dba6366ad4d72c22fe90bc96706c3036d704e5d4ce096a1ce62b07af03cdc1d0d0f1cafd72d7cf2949be0189390b326de1ee3287de83459f2e0c36bb8b6af3003ddb9adc1bc79ca79f5a930d9af545b0082b545b5515a3ec8129aeda30229cdf1023a5abd9c0a28dd52b465434507e1b964354c9592fede8ee268353fe70be8cbe8ed365491ba681bda2c87230aa5b8e19f9f817233eb8265458398c5dfe23c064b371e21e9a3bd487c588c18316dc0dc08ee096c42ca990e876b2c687a24b8348e311bf0ae091eabf0617a7ef67557db1551edf0fe64d2afff34f8e11302f4a0483771a4e20ce04a47d2b1a3c18b3f09ce201662481537b38f65495439983e1a264f7f7133d1849f76949c195a53936da5dfec7aaddccaf2ffd831115394147a857caf138c94144b53a515f111fc3c008cb0cfe5f39d3d0cb22115440d20433b4bd959f4f5110feff16ecfdc80554fbae046d7554e93cd1275d9ceaddc0ca1672c46d56670a37928adc2d708646d6dde3e4b7f5524526b865ed664a87d9eca8d1cea5144fbfb40eb6fb89c37e5a54c1a5c42280796ab382089a9574a6f5157572bd079df4a119994172a2e5ab63d0fb48b696ed8d2c7e0ef262382ec739437951967840e8351d29f368e2df7c5bff4e98fecf457fc8a34605ae16d7f3d6a9d3ac09ead5f2c218ad9e1c78827e17e4ef697beef78cb6b94a321b2eae43d6fab686154e6d1a1e18fd056498c57c3989c52181453f994f778b8fabd96604f7f79a69b83de7118bcfb2163e271830454a5622be10edf71facb7c19334fa42b1fd606219f272bc70c58eb8d6c1c5b49a911116713f5beaeb0fa28bcb12e59c74a930a1e56f414d810c3a62e4f30d560df7a21b57993b5fd2261ebe918c313d4817a6cfaee22acc226e70776776a055ba47cd9703558497955fe21aedb6152e715b929d40a03d48161153dd9ba7306aeca51da1c7185db2978d9ac2f04cd3084842e01fed616fae30ba533938b66c7e4654dabda55fd270d51e0c5076bbe14f3be8bedc6b631960254a60e9cd2047814f65c2cda5200d14aae96c06d7a9d680a2d849a3da5e0c91c88b4110bbddb2c520e4ba4566ac129ac4af0173b82a2068c7bdd2a932414f202a393692a753c9cd5974a9ef88974ccd5eb6cfa565cc3848608f4fda9ad95e0dc6235134ecad7012f5a29942638017f30fecfd840d6b045f377c33760d6952990334070cd58ca78ad5ab838ea0ad1a1f19313c37e6f508469855a0f9e549d105a117dc5810f09d5101081f71dcad4163a0f3399388bbb6735aeefb8b2ca3a5d6a8935ef807eb7e1a826c0a970ab5f52784e839b0798585f0350317e20e1d8067e92a1877f060d219df2626c4d6e2b4b5d5e91f41a0833e466bef25a862baaf9224e4d507da3a3a3ba4fc8d82ffecdd8313a852fa7e42c73c97c5d880d54214ae2e432adea8bd5539509d20ff3ac8ec390fd67da348e9a5eb089a3550bda79547b7eea36a5698a77b681656d07977c017c3703fe4a87f47a0762d21b2da5d8a0fe50c54eb1ee84b502d50f9cbc8916614c710566d639bf1470dac28af91d19b350c0df1621dd2e83ee8fd9db5bb4d02a2108fc4b3e63b91", 0xd01}], 0x1) 10:56:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) 10:56:27 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() prctl$setptracer(0x59616d61, r0) wait4(0x0, &(0x7f00000000c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) prctl$setptracer(0x59616d61, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x1f, r0, 0x0, 0x4) 10:56:27 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x880000, 0x1800000000000000, "f1d038f7c81bf6bd3c210a6569237ae12c4ab3bf83d4fa33964f0cdd4feeb818cde7a2d8ec9b696d5ab92f971f900b7d83f7d4c2fab1315a3f4b4213d4172b", 0xd}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x1, 0x80, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000040)='bdevuser\x00', 0xffffffffffffffff}, 0x30) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x6a, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d84648a27f11c72be049eb4be1977d486a72d7363417ef6c9079a2ea9747b34bd1d6e19e60597be8e1d504832c8182e40b2572d6ac0963e03f3a02f8ebf430a4dc18f77751be", &(0x7f00000000c0)=""/41, 0x100}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x33, &(0x7f0000000000), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000002c0)=r0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x200000000000000c, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000380)=""/206}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001600)={r4, 0x0, 0xe, 0xaf, &(0x7f0000001480)="c0d3dccf41b8d0a75e4b1aa94f20", &(0x7f0000001540)=""/175}, 0x28) 10:56:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) [ 355.298573] net_ratelimit: 1272 callbacks suppressed [ 355.298582] protocol 2cea is buggy, dev gre0 [ 355.319431] protocol 2cea is buggy, dev gre0 [ 355.337153] protocol 2cea is buggy, dev gre0 10:56:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000540), 0x4) sendmsg$kcm(r0, &(0x7f00000017c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, &(0x7f0000001780), 0x0, &(0x7f00000008c0)}, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x2120) [ 355.348132] protocol 2cea is buggy, dev gre0 [ 355.348682] protocol 2cea is buggy, dev gre0 [ 355.370662] protocol 2cea is buggy, dev gre0 [ 355.390906] protocol 2cea is buggy, dev gre0 [ 355.403960] protocol 2cea is buggy, dev gre0 [ 355.410452] protocol 2cea is buggy, dev gre0 [ 355.421849] protocol 2cea is buggy, dev gre0 10:56:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0xe, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cea", &(0x7f00000000c0)=""/41}, 0x28) 10:56:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') 10:56:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:27 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x11c4}}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) 10:56:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:28 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x880000, 0x1800000000000000, "f1d038f7c81bf6bd3c210a6569237ae12c4ab3bf83d4fa33964f0cdd4feeb818cde7a2d8ec9b696d5ab92f971f900b7d83f7d4c2fab1315a3f4b4213d4172b", 0xd}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:28 executing program 4: 10:56:28 executing program 2: 10:56:28 executing program 3: 10:56:28 executing program 4: 10:56:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:28 executing program 3: 10:56:28 executing program 4: 10:56:28 executing program 2: 10:56:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:29 executing program 3: 10:56:29 executing program 2: 10:56:29 executing program 4: 10:56:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:29 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x880000, 0x1800000000000000, "f1d038f7c81bf6bd3c210a6569237ae12c4ab3bf83d4fa33964f0cdd4feeb818cde7a2d8ec9b696d5ab92f971f900b7d83f7d4c2fab1315a3f4b4213d4172b", 0xd}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:29 executing program 4: 10:56:29 executing program 3: 10:56:29 executing program 2: 10:56:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:29 executing program 3: 10:56:29 executing program 4: 10:56:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:30 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x880000, 0x1800000000000000, "f1d038f7c81bf6bd3c210a6569237ae12c4ab3bf83d4fa33964f0cdd4feeb818cde7a2d8ec9b696d5ab92f971f900b7d83f7d4c2fab1315a3f4b4213d4172b", 0xd}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:30 executing program 3: 10:56:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:30 executing program 4: 10:56:30 executing program 2: 10:56:30 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_targets\x00') sendfile(r0, r0, &(0x7f0000000040)=0x20000, 0x1) 10:56:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 10:56:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='maps\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/99, 0x63}], 0x1) 10:56:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') readv(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/250, 0xfa}, {&(0x7f00000002c0)=""/117, 0x75}, {&(0x7f0000000340)=""/213, 0xd5}], 0x3) 10:56:30 executing program 2: clock_gettime(0x0, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000000)=0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000080)=""/29) io_submit(r0, 0x0, &(0x7f0000001200)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) ptrace(0xffffffffffffffff, 0x0) 10:56:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@rand_addr}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) 10:56:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000540)=0x950, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) fcntl$setownex(r3, 0xf, &(0x7f0000000400)) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @multicast1}, &(0x7f00000000c0)=0xc) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r4, &(0x7f0000000280)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10000000f) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket$unix(0x1, 0x5, 0x0) epoll_create1(0x80000) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socketpair(0x1, 0xa, 0xd315, &(0x7f0000000180)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendto$inet6(r1, &(0x7f0000000100), 0x7a2a, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) epoll_wait(r2, &(0x7f00000004c0)=[{}], 0x1, 0x3a73) 10:56:31 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x880000, 0x1800000000000000, "f1d038f7c81bf6bd3c210a6569237ae12c4ab3bf83d4fa33964f0cdd4feeb818cde7a2d8ec9b696d5ab92f971f900b7d83f7d4c2fab1315a3f4b4213d4172b", 0xd}, 0x80, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x800}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000007c0)=ANY=[]) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=[@increfs], 0x64, 0x0, &(0x7f00000003c0)="0b0a5c251be879723505dec9a1001a1118b48882f068c113e8465a3c8ffd920944ac87623cca8995dea1c193af5ed87491105e552b197b358653e8308cc39a387aec51dd960b9cfbd399d2657bbeec12d12235e9a9576f677db6da45e0cf982beeb76bcd"}) [ 359.442446] binder: 13090:13092 IncRefs 0 refcount change on invalid ref 0 ret -22 10:56:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r0, &(0x7f0000000040)=0x20000, 0x1) 10:56:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:31 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendfile(r0, r0, &(0x7f0000000080)=0x20000, 0x400000) 10:56:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:31 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2000000084) sendto$inet(r0, &(0x7f0000000140)='X/\x00\x00', 0x4, 0x0, &(0x7f0000000080), 0x10) 10:56:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x6f, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0x397, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 10:56:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:32 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000040)=""/9, 0x9}], 0x1) 10:56:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:32 executing program 2: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="84"], 0x1) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200600}]) 10:56:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:32 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) [ 360.320343] net_ratelimit: 2802 callbacks suppressed [ 360.320351] protocol 2cea is buggy, dev gre0 [ 360.333200] protocol 2cea is buggy, dev gre0 [ 360.344972] protocol 2cea is buggy, dev gre0 [ 360.347607] protocol 2cea is buggy, dev gre0 [ 360.356931] protocol 2cea is buggy, dev gre0 [ 360.361999] protocol 2cea is buggy, dev gre0 [ 360.367934] protocol 2cea is buggy, dev gre0 [ 360.372038] protocol 2cea is buggy, dev gre0 [ 360.373230] protocol 2cea is buggy, dev gre0 [ 360.383039] protocol 2cea is buggy, dev gre0 10:56:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:32 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:32 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) 10:56:32 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x0) write(r2, &(0x7f0000000040)="16", 0x1) sendfile(r1, r2, &(0x7f0000000000), 0xffff) close(r0) 10:56:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:33 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) close(r0) 10:56:33 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) socket$kcm(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:33 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='maps\x00') 10:56:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'team_slave_1\x00'}) 10:56:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=ANY=[], 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:33 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000540)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:33 executing program 4: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="84"], 0x1) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200600, 0xc600}]) 10:56:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat6\x00') sendfile(r0, r0, &(0x7f0000000000)=0x20000, 0x1) 10:56:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) munlockall() r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x2, 0x803, 0x2000000000000002) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) 10:56:33 executing program 0: socketpair(0x11, 0x7, 0x1e9, &(0x7f0000000500)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f00000001c0)=[@free_buffer], 0x0, 0x0, &(0x7f0000000240)}) 10:56:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) [ 362.214322] binder: 13248:13250 BC_FREE_BUFFER u0000000000000000 no match 10:56:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) [ 362.270457] binder: 13248:13250 BC_FREE_BUFFER u0000000000000000 no match 10:56:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000340), 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 10:56:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:34 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2000000084) sendto$inet(r0, &(0x7f0000000140)="582f000000de000000000000", 0xc, 0x0, &(0x7f0000000080), 0x10) 10:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/softnet_stat\x00') sendfile(r0, r0, &(0x7f0000000040)=0x8000, 0x400000000000005) 10:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:35 executing program 4: readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:35 executing program 4: readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') sendfile(r0, r0, &(0x7f0000000040)=0x8000, 0x400000000000005) 10:56:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:35 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000200)=""/17, 0x11, 0x0) 10:56:35 executing program 4: readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:35 executing program 3: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)) 10:56:36 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:36 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='limits\x00') sendfile(r0, r0, &(0x7f0000000080)=0x20000, 0x400000) 10:56:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:36 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000022c0)=[{&(0x7f00000011c0)=""/84, 0x54}], 0x1) 10:56:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f6669611b36095c6296df5cc8a5df2d2f625f7472696500") 10:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0), 0x0) 10:56:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001540)='oom_score\x00') unshare(0x2000400) preadv(r0, &(0x7f0000000000), 0x0, 0x0) 10:56:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x0) 10:56:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0), 0x0) [ 365.323722] net_ratelimit: 3106 callbacks suppressed [ 365.323731] protocol 2cea is buggy, dev gre0 [ 365.369968] protocol 2cea is buggy, dev gre0 [ 365.392139] protocol 2cea is buggy, dev gre0 10:56:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) [ 365.416499] protocol 2cea is buggy, dev gre0 [ 365.444031] protocol 2cea is buggy, dev gre0 [ 365.467481] protocol 2cea is buggy, dev gre0 10:56:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') read(r0, &(0x7f00000000c0)=""/196, 0xc4) 10:56:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000022c0), 0x0) [ 365.493376] protocol 2cea is buggy, dev gre0 10:56:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) [ 365.548862] protocol 2cea is buggy, dev gre0 [ 365.594453] protocol 2cea is buggy, dev gre0 [ 365.617553] protocol 2cea is buggy, dev gre0 10:56:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) 10:56:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) 10:56:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000140)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000180)=""/195}, 0x48) 10:56:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="0000007000000000020010a20000008c0004d042aa9eeac06fa515d776db933fa06eb8142b6f04e4ff400d099a5cb7fff86a51b090265ea6510ddb8b087217ae6815a94fa4a60338706433", 0x3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) getgid() r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000300)="2a647596280fc446bc5535dcb080c584", 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) 10:56:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x2e3}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000001580)=""/52) dup2(r0, r1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000004c0)}], 0x1}, 0x0) 10:56:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r7, 0x28007d) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @multicast2}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x2, 0x0) 10:56:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:39 executing program 4: r0 = socket$kcm(0x2, 0x1000000000003, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000140)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) [ 367.450478] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:56:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:39 executing program 4: socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f00000000c0), 0xffffff19) close(r0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 368.252748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:56:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x2e3}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000001580)=""/52) dup2(r0, r1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000004c0)}], 0x1}, 0x0) 10:56:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r8 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r8, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pread64(0xffffffffffffffff, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:40 executing program 4: socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f00000000c0), 0xffffff19) close(r0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:56:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pread64(0xffffffffffffffff, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x9}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x100) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:56:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) [ 368.729073] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:56:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x1800000000000000, 0x30, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d83a48a27f11c72be049eb4b", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f00)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') socket$kcm(0x29, 0x0, 0x0) 10:56:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pread64(0xffffffffffffffff, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x0, 0x29, &(0x7f0000000440), &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 10:56:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x10, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$netlink(r1, &(0x7f0000000900), &(0x7f0000000940)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x10, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}]}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x10, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/16}, &(0x7f00000004c0)=0x78) chdir(&(0x7f0000000000)='./file0\x00') ftruncate(0xffffffffffffffff, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}) r7 = open(&(0x7f00000003c0)='./file0\x00', 0x20141046, 0x0) sendfile(r7, r7, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000600)) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000700)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) connect$vsock_stream(r3, &(0x7f00000009c0), 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000007c0)="ee35369f38817926c2a0fb361df240481fa61d89e49cb4be5a", 0x19) lsetxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)='security.SMACK64EXEC\x00', &(0x7f0000000780)='fd', 0x2, 0x2) keyctl$revoke(0x3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 10:56:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) 10:56:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x0, 0x29, &(0x7f0000000440), &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000200"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x0, 0x29, &(0x7f0000000440), &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x44}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 10:56:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x18, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a3", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00'}, 0x10) 10:56:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000002000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2d, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be9", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 10:56:41 executing program 3: 10:56:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000300)=""/112, 0xfffffdfb, 0x0) [ 370.115116] ------------[ cut here ]------------ [ 370.120104] kernel BUG at net/ipv4/ip_output.c:776! [ 370.125402] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 370.130791] CPU: 0 PID: 13597 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 370.139376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.148809] RIP: 0010:ip_do_fragment+0x2447/0x2ad0 [ 370.153750] Code: ff 48 89 cf e8 7a 10 30 fb e9 dc ea ff ff 48 89 df e8 ad 10 30 fb e9 02 e7 ff ff e8 03 11 30 fb e9 97 e6 ff ff e8 99 b8 ec fa <0f> 0b 4c 89 f7 e8 4f 10 30 fb e9 2f e6 ff ff 4c 89 e7 e8 42 10 30 [ 370.172657] RSP: 0018:ffff880182c4e7c0 EFLAGS: 00010212 [ 370.178043] RAX: 0000000000040000 RBX: ffff8801bef317c0 RCX: ffffc9000fe69000 [ 370.182757] kobject: 'loop0' (00000000ac86c66b): kobject_uevent_env [ 370.185318] RDX: 000000000000c2b4 RSI: ffffffff8692f017 RDI: 0000000000000005 [ 370.185328] RBP: ffff880182c4e998 R08: ffff880184c364c0 R09: ffffed002f3b0942 [ 370.185337] R10: ffffed002f3b0944 R11: ffff880179d84a23 R12: ffff8801bef31884 [ 370.185346] R13: 00000000fffffff2 R14: ffff8801bef31890 R15: dffffc0000000000 [ 370.185358] FS: 00007f6af87d9700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 370.185367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.185382] CR2: 0000000000707158 CR3: 00000001801eb000 CR4: 00000000001406f0 [ 370.192158] kobject: 'loop0' (00000000ac86c66b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 370.199050] Call Trace: [ 370.199134] ? wait_consider_task+0x620/0x3bb0 [ 370.199154] ? ip_copy_metadata+0xe10/0xe10 [ 370.263236] ? ip_finish_output2+0x1860/0x1860 [ 370.267910] ? graph_lock+0x270/0x270 [ 370.271770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.277361] ? ipv4_mtu+0x39f/0x590 [ 370.281029] ? rt_acct_proc_show+0x370/0x370 [ 370.285452] ? find_held_lock+0x36/0x1c0 [ 370.289530] ip_fragment.constprop.50+0x179/0x240 [ 370.294384] ip_finish_output+0x58e/0xfa0 [ 370.298548] ? ip_fragment.constprop.50+0x240/0x240 [ 370.303639] ? kasan_check_read+0x11/0x20 [ 370.307835] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 370.313157] ? nf_nat_ipv4_out+0x2e1/0x340 [ 370.317396] ? rcu_read_unlock_special+0x370/0x370 [ 370.322328] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 370.327376] ? nf_hook_slow+0x11e/0x1c0 [ 370.331364] ip_output+0x21d/0x8d0 [ 370.334905] ? ip_mc_output+0x15a0/0x15a0 [ 370.339062] ? ip_fragment.constprop.50+0x240/0x240 [ 370.344083] ? __ip_select_ident+0x16b/0x2a0 [ 370.348497] ? rt_cache_valid+0x250/0x250 [ 370.352650] ip_local_out+0xc5/0x1b0 [ 370.356402] iptunnel_xmit+0x56a/0x8d0 [ 370.360301] ip_tunnel_xmit+0x15b8/0x3c04 [ 370.364456] ? ip_tunnel_init_net+0xac0/0xac0 [ 370.368962] ? __sanitizer_cov_trace_cmp2+0x1a/0x20 [ 370.374031] ? kasan_check_write+0x14/0x20 [ 370.378282] ? pskb_expand_head+0x6b3/0x10f0 [ 370.382700] ? skb_release_data+0x880/0x880 [ 370.387069] ? dev_queue_xmit_nit+0x93b/0xc80 [ 370.391604] ? check_preemption_disabled+0x48/0x280 [ 370.396631] ? kasan_check_read+0x11/0x20 [ 370.400780] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 370.406061] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 370.411603] __gre_xmit+0x5e1/0x980 [ 370.415238] ipgre_xmit+0x3e7/0xba0 [ 370.418873] ? gre_tap_xmit+0x590/0x590 [ 370.422849] ? __lock_is_held+0xb5/0x140 [ 370.426918] dev_hard_start_xmit+0x290/0xc70 [ 370.431332] ? dev_direct_xmit+0x6b0/0x6b0 [ 370.435567] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 370.441108] ? netif_skb_features+0x690/0xb70 [ 370.445603] ? rcu_softirq_qs+0x20/0x20 [ 370.449616] ? validate_xmit_xfrm+0x1ef/0xda0 [ 370.454124] ? validate_xmit_skb+0x80c/0xf30 [ 370.458539] ? netif_skb_features+0xb70/0xb70 [ 370.463051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.468590] ? check_preemption_disabled+0x48/0x280 [ 370.473605] ? check_preemption_disabled+0x48/0x280 [ 370.478625] __dev_queue_xmit+0x2f9d/0x3ac0 [ 370.482954] ? save_stack+0x43/0xd0 [ 370.486584] ? kasan_kmalloc+0xc7/0xe0 [ 370.490470] ? __kmalloc_node_track_caller+0x50/0x70 [ 370.495582] ? netdev_pick_tx+0x310/0x310 [ 370.499734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.505272] ? check_preemption_disabled+0x48/0x280 [ 370.510294] ? __lock_is_held+0xb5/0x140 [ 370.514364] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 370.519378] ? skb_release_data+0x1c4/0x880 [ 370.523703] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 370.528981] ? kasan_unpoison_shadow+0x35/0x50 [ 370.533578] ? skb_tx_error+0x2f0/0x2f0 [ 370.537559] ? __kmalloc_node_track_caller+0x50/0x70 [ 370.542681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 370.548218] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 370.553757] ? kasan_check_write+0x14/0x20 [ 370.557990] ? pskb_expand_head+0x6b3/0x10f0 [ 370.562419] ? skb_release_data+0x880/0x880 [ 370.566738] ? __alloc_skb+0x770/0x770 [ 370.570630] ? __lock_is_held+0xb5/0x140 [ 370.574700] ? kasan_check_write+0x14/0x20 [ 370.578930] ? __skb_clone+0x6c7/0xa00 [ 370.582819] ? __copy_skb_header+0x6b0/0x6b0 [ 370.587238] ? kmem_cache_alloc+0x33a/0x730 [ 370.591565] ? skb_ensure_writable+0x15e/0x640 [ 370.596155] dev_queue_xmit+0x17/0x20 [ 370.599957] ? dev_queue_xmit+0x17/0x20 [ 370.604018] __bpf_redirect+0x5cf/0xb20 [ 370.608029] bpf_clone_redirect+0x2f6/0x490 [ 370.612355] bpf_prog_bebbfe2050753572+0x32a/0x1000 [ 370.617374] ? __sched_text_start+0x8/0x8 [ 370.621520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.626282] ? find_held_lock+0x36/0x1c0 [ 370.630350] ? lock_acquire+0x1ed/0x520 [ 370.634326] ? bpf_test_run+0x3cb/0x780 [ 370.638301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.643845] ? check_preemption_disabled+0x48/0x280 [ 370.648869] ? kasan_check_read+0x11/0x20 [ 370.653037] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 370.658321] ? rcu_softirq_qs+0x20/0x20 [ 370.662294] ? preempt_schedule+0x4d/0x60 [ 370.666443] ? ___preempt_schedule+0x16/0x18 [ 370.670854] ? bpf_test_run+0x25d/0x780 [ 370.674838] ? netlink_diag_dump+0x2a0/0x2a0 [ 370.679250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 370.684791] ? bpf_test_init.isra.10+0x70/0x100 [ 370.689463] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 370.694229] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 370.699071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 370.704671] ? fput+0x130/0x1a0 [ 370.707981] ? __bpf_prog_get+0x9b/0x290 [ 370.712063] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 370.716904] ? bpf_prog_test_run+0x130/0x1a0 [ 370.721345] ? __x64_sys_bpf+0x3d8/0x520 [ 370.725414] ? bpf_prog_get+0x20/0x20 [ 370.729230] ? do_syscall_64+0x1b9/0x820 [ 370.733291] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 370.738662] ? syscall_return_slowpath+0x5e0/0x5e0 [ 370.743597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.748494] ? trace_hardirqs_on_caller+0x310/0x310 [ 370.753518] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 370.758536] ? prepare_exit_to_usermode+0x291/0x3b0 [ 370.763557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.768406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.773768] Modules linked in: [ 370.777119] ---[ end trace a10b8a48c62a4934 ]--- [ 370.782043] RIP: 0010:ip_do_fragment+0x2447/0x2ad0 [ 370.787114] Code: ff 48 89 cf e8 7a 10 30 fb e9 dc ea ff ff 48 89 df e8 ad 10 30 fb e9 02 e7 ff ff e8 03 11 30 fb e9 97 e6 ff ff e8 99 b8 ec fa <0f> 0b 4c 89 f7 e8 4f 10 30 fb e9 2f e6 ff ff 4c 89 e7 e8 42 10 30 [ 370.806131] RSP: 0018:ffff880182c4e7c0 EFLAGS: 00010212 [ 370.811573] RAX: 0000000000040000 RBX: ffff8801bef317c0 RCX: ffffc9000fe69000 [ 370.818923] RDX: 000000000000c2b4 RSI: ffffffff8692f017 RDI: 0000000000000005 [ 370.826323] RBP: ffff880182c4e998 R08: ffff880184c364c0 R09: ffffed002f3b0942 [ 370.833692] R10: ffffed002f3b0944 R11: ffff880179d84a23 R12: ffff8801bef31884 [ 370.841053] R13: 00000000fffffff2 R14: ffff8801bef31890 R15: dffffc0000000000 [ 370.848423] FS: 00007f6af87d9700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 370.856750] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.862713] CR2: 0000000000707158 CR3: 00000001801eb000 CR4: 00000000001406f0 [ 370.870120] Kernel panic - not syncing: Fatal exception in interrupt [ 370.877566] Kernel Offset: disabled [ 370.881188] Rebooting in 86400 seconds..