x40107446, &(0x7f0000000240)=""/174) 16:29:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) write$binfmt_script(r0, 0x0, 0x2fa) 16:29:33 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) read(r0, 0x0, 0x3c8) [ 1066.961348][T10402] EXT4-fs (sda1): re-mounted. Opts: [ 1067.024466][T10406] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode'}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2fa) 16:29:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:33 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) read(r0, 0x0, 0x3c8) 16:29:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x40107446, &(0x7f0000000000)) 16:29:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x5}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2fa) 16:29:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x40107447, &(0x7f0000000000)) 16:29:34 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) read(r0, 0x0, 0x3c8) 16:29:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000240)=""/174) 16:29:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2fa) 16:29:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4010744d, &(0x7f0000000000)) 16:29:34 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB='#'], 0x1) read(0xffffffffffffffff, 0x0, 0x3c8) 16:29:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x1}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4020940d, &(0x7f0000000240)=""/174) 16:29:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:34 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB='#'], 0x1) read(0xffffffffffffffff, 0x0, 0x3c8) 16:29:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4020940d, &(0x7f0000000000)) 16:29:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000240)=""/174) 16:29:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xc000000000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:34 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB='#'], 0x1) read(0xffffffffffffffff, 0x0, 0x3c8) 16:29:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x80047441, &(0x7f0000000000)) 16:29:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode'}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x80047456, &(0x7f0000000000)) 16:29:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 16:29:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x8004745a, &(0x7f0000000000)) 16:29:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[{@mode={'mode', 0x3d, 0x5}}], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x8004745a, &(0x7f0000000240)=""/174) 16:29:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x8010743f, &(0x7f0000000000)) 16:29:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 16:29:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000240)=""/174) 16:29:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0xc0045878, &(0x7f0000000000)) 16:29:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x38, 0x32, 0x67, 0x72, 0x73, 0x77], 0x2d, [0x66, 0x61, 0x77, 0x7b], 0x2d, [0x34, 0x66, 0x77, 0x34], 0x2d, [0x75, 0x34, 0x77, 0x64], 0x2d, [0x66, 0x0, 0x7f, 0x38, 0x7f, 0x7b, 0x65, 0x37]}}}]}) 16:29:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:35 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:29:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[], [{@dont_hash='dont_hash'}, {@euid_eq={'euid'}}]}) 16:29:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0xc0045878, &(0x7f0000000000)) 16:29:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)={[], [{@dont_hash='dont_hash'}]}) 16:29:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0xc008744c, &(0x7f0000000000)) 16:29:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:29:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)) 16:29:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0xc0189436, &(0x7f0000000000)) 16:29:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x100020, 0x0) 16:29:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) 16:29:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)) 16:29:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0xc020660b, &(0x7f0000000000)) 16:29:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x100020, 0x0) 16:29:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:29:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, &(0x7f0000001540)) 16:29:36 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0xfdfdffff) 16:29:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc020660b, &(0x7f0000000240)=""/174) 16:29:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, 0x0) 16:29:36 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0xfffffdfd) 16:29:37 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, 0x0) 16:29:37 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x8000004000014000, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) fstat(r1, &(0x7f0000000000)) 16:29:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0xfdfdffff00000000) 16:29:37 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, 0x0) 16:29:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ppp\x00', 0x4001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0xdc, 0x9, "d79c844b3884527537ed80ecfe9fc0adb9f7a3c6b78d43aca57b77094273e9615ad53fc348b16d9dd76e1de0391f369b09a500f20ffbad62db306e79d4804f", 0x7}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000100)="8c9ea947820fa3ae85c87349d32865174400e2f28215ec78f68f361d4f3b0ecd71ec4dc7d828e3d320a1e9de8c9e01d85ad57eadc58a7639bcedf3cf02062404178bba5bb63acc3d96193822338bda2b294519460f99e60307d724192d0140fa761cb6bc1b7c2a2e192f7cb1cd8bf7b814732e7c0d8de9a1424c8cd6b9b8491d5f74e9d80c06e5112a3534368998685010955c0faf4777a57211d0e63bd2f6f7", 0xa0}, {&(0x7f0000000240)="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", 0xfc}, {0xffffffffffffffff}, {&(0x7f0000000340)="91cf7038b6c7532f3a71ac77531f626943a3fa71ecbae9314b443862073b1d8a69abd35ed1ce2ad8e3ae89e8c84b124152e7da78474c43c68dc45749b5287cd58aba54164e7f7d3267aaa3be82674d73f16e9e3f262f85320d3349b9cc11c3841639a35de7ddca2fc454ede1529780e32f5a3090d55f4729bd7615079c9f245d05473b45fa2ccbc3d9c0958d61f6e8244cde96b3ef96a22e1aff366958f97b2761c6ba3621c9144bac69d4b8ac7a2718a533309825647f9debab8d09ff8af06f4942eb20d7bd8c3fe92733de256107", 0xcf}, {&(0x7f0000000540)="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", 0xfc}, {&(0x7f0000000640)="eb75605e56eaa759ff7ee853604c8bd52629b995355ec047c16d0782bc9c821de3fe33de6babfaf490f7dc805d80ee826ec55500c50482485407a4e0442379ccb3c98703ce3ee5391ea296c2bf2b426e175b7cf24014c7fbe45af521c38ec8228a9a4aa1651230143c0119d4bd8d41ffb1ea7385032f27a4b2f9fa683590111f72813d06987526bae2de8b524be2c9fb8c3a168e7b4ea02ab2d5f56c83e7fa9b4fc76ce14fc5271863220065e0025fb261feae", 0xb3}, {&(0x7f00000001c0)="0f065a9a7caeabac4f84811cd6d1de66aeaa96c1ca3adcf1196b", 0x1a}], 0x7, &(0x7f0000000780)=[{0xe0, 0x10e, 0x2, "68a5ec9e5a7248907d3f234c929dc1376683c45b8673a8d24aec06522dd6d24a8b04dd4293b5a3246935da7af6ceb4fae8c7ee31708c2a19c467ee8de0df3b85996a6cd91950376379bf7e2bc600fde3fe48d71a20fcf3b75764c949a457a8752622b206eaba7f63ef2ed65d072fd1b36dbbb7d3a044900e280c6dfcc7f8c9d2dd3fdabccf5d89c08abc430a25cce7cc3c979b5067ac0eb559f44a1696b4096b6e410c07708dc45e06cf68ea50e443c4a9cb5d33e3ba2ab4faa5d2900c1a84c64b42ce044af26efc7f1b"}, {0x78, 0x10c, 0xfffffffffffffffb, "68d64e06826a15b0f8351d0b1bb2ff77a90c395eab3cd243f62ed2caf4877d86cb5253acc5a4c0fea1dc73080d1bcc15553b6806221c4c0e0bb6614c1ebd251304ed4e1cbb3d374e0f0a93c8c405618aabc79f00a3fca069eb97d36ff1309361dd33d7"}, {0x18, 0x13f, 0xeb5, 'Z'}, {0xb0, 0x105, 0x200, "ae9c77c0433d0c850a2979504805fce76cf8c2828bcfc83f089a0cb35322d8df0862e6663e28628905eca312506759301732f72f3768288b5550284454a80468945104bc49084b2a4a8ce26869e92096ce2fd35709aaeaec2797f435f8eddd066107359146a75bd70dcb9407bc905d94e537b2f810ed18476952cb45c734639e4af68a0736f763758bf72e8e0f245703b705cde97e1bbf6c2e85b5c25e"}], 0x220}, 0x4000000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e24, 0x7, @ipv4={[], [], @loopback}, 0x423}}, 0x800, 0x4}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000ac0)={r2, 0x7, 0x2db}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000b00)=@assoc_value={r2, 0x20}, &(0x7f0000000b40)=0x8) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = userfaultfd(0xe597ac9258b5354a) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x263236d7, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000380)={r3, r1, 0xfffffffffffffffb, 0xc6, &(0x7f0000000540)="5cb7735a10a0b881a4074537e6f27a9fbecfd7c7f881e859eefbb4bd8527621b48672706015cdc587fa911d9a93f90678292af50cd264cd3c68244731b640df9a893679a7d3dd62a3fc48f16b30f14ae8fdcc9f6a1f560af4989349a37cda41056404b4f7b41f3848364a72ad360293aed40e14325d8e96e1f5e85f7e8dc97635adfe3117d017d68cb9bf5615d2d45fa490bd2b926fbd146be718d5f98862035003d87bec2fcfd7121adb90bfd8889fa035e7c927c8e800ca330c605e29cea168b2c738ba1a5", 0x8000, 0xff, 0x80000000, 0x8, 0x4, 0x2, 0x100000001, 'syz1\x00'}) r4 = dup3(r0, r0, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x4}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(r5, &(0x7f0000000700)=@ethernet={0x0, @dev}, &(0x7f0000000780)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000000)=""/174) 16:29:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, 0x0) 16:29:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20001, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000080)=""/9) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, 0x0) 16:29:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) fanotify_init(0x4, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x2) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000300)=""/174) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000000)={0x10001, "06e151a6ba1ad27869ecb8094e50f8291c7134a0ff65940cbc466629338f187a", 0x3, 0x1}) 16:29:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, 0x0) 16:29:38 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x8000, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x101, 0x4000) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x50000) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x100020, 0x0) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:38 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x100020, 0x0) 16:29:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x7b6bd9615438aff0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000240)={0x6, &(0x7f00000001c0)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000380)={r2, 0xa, &(0x7f0000000280)=[0x0, 0xffffffffffff8001, 0x8001, 0x3a, 0x9, 0x9, 0xe3, 0x5, 0x4, 0xfe8], &(0x7f00000002c0)=[0x5, 0x9, 0x8000], 0x10, 0x5, 0x7f, &(0x7f0000000300)=[0x100000000, 0xfffffffffffffffa, 0x7, 0x0, 0x1], &(0x7f0000000340)=[0x3, 0x7ff, 0x8, 0x1f, 0x80000001, 0xffffffffffffc755, 0x505a, 0x0, 0x5]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x200}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r3, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r4, 0x3}, 0x8) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:38 executing program 5: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, 0x0) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x28000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x210002, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='veth0_to_hsr\x00'}) 16:29:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x48, 0x0, 0x100020, 0x0) 16:29:38 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xf7, 0x20000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000000c0)=0x4) 16:29:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, 0x0) 16:29:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:38 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000040)) 16:29:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x60, 0x0, 0x100020, 0x0) 16:29:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x9) 16:29:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x68, 0x0, 0x100020, 0x0) 16:29:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x81, 0x1, 0x4, 0xffffffffffffff01, 0x7fff, 0x7ff}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000000)=""/3) 16:29:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, 0x0) 16:29:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10102, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000000c0)={0x2}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) accept$netrom(r1, &(0x7f0000000100)={{0x3, @bcast}, [@remote, @null, @netrom, @rose, @default, @null, @default, @rose]}, &(0x7f0000000180)=0xffffffffffffff43) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x74, 0x0, 0x100020, 0x0) 16:29:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x2000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x8b, 0x0, 0x0, 0x0, @ib={0x1b, 0x7, 0x10001, {"a2f58c8ac517766d3dffdb35ab81859b"}, 0xffffffffffff7fff, 0x3, 0x3}, @in={0x2, 0x4e21, @loopback}}}, 0x118) select(0x40, &(0x7f00000001c0)={0x8, 0x7fffffff, 0x80, 0x2, 0x1, 0x5, 0x401, 0x2}, &(0x7f0000000380)={0x4, 0x8001, 0x0, 0x800, 0xfffffffffffffff8, 0x20, 0x1, 0x613b}, &(0x7f00000003c0)={0x9, 0x81, 0x3, 0x0, 0x90000, 0x75888019, 0x9, 0x7fff}, &(0x7f0000000400)={0x0, 0x2710}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) fcntl$notify(r0, 0x402, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000140)={0x10000, 0x1f, 0x80000000, {}, 0x6, 0x7ff}) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000540)=""/231) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2102, 0x0) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x34081) getdents(r1, &(0x7f0000000040)=""/39, 0x27) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e24, @multicast2}}) 16:29:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7a, 0x0, 0x100020, 0x0) 16:29:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r2 = msgget(0x3, 0x40) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x12f, 0x101100) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x8001, 0x1, 0x6, 0x401]}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f00000000c0)=""/193) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000080)={0x2a, 0x3, 0x0, {0x3, 0x9, 0x0, '/dev/ppp\x00'}}, 0x2a) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x401}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) 16:29:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xc0, 0x0, 0x100020, 0x0) 16:29:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x420100, 0x0) io_setup(0x8700, &(0x7f0000000080)=0x0) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000000200)="97828aa106d3cb68c7f9e241d0674727d18c22e1a39b422aa8420ff55a62018a6122bfdd0d8266ecb37d60250858525c56094e6253517ea1ced4ec97ef567e5f8dd7bbc00e8b8a14cf0c8d3739521eecaab0dd28941e217f58d8a47bc050c6388b267488d603d14ae54198ed8c105969fbca002c9b9d29b171150ce52deef93e9e9e93d66757", 0x86, 0x100, 0x0, 0x2, r1}, &(0x7f0000000140)) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, 0x0) 16:29:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, 0x0) 16:29:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 16:29:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, 0x0) 16:29:40 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x2000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x596f0469a319178e) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) 16:29:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, 0x0) 16:29:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe9, 0x2000) accept$ax25(r1, &(0x7f0000000080)={{0x3, @default}, [@netrom, @bcast, @default, @default, @netrom, @bcast, @netrom, @rose]}, &(0x7f0000000140)=0x48) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x440, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xa0080, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:29:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x100020, 0x0) 16:29:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/150, 0xfffffffffffffe1f) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x511200, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="b3000000ff77f9299f97e4c9da4d3f1e118f32475af024e41d039b8f6553e86df23475166b842b2e4f6b23c5e17e45530390dd5ad20e7be7e239f0e53095cbaa2ae188a1a9493a1d4507049aa7871023dea4fdb2b259e83fa10215566a5c50ab527a186606000000fad5a0f635f90933e76229af75439817f15d4f1fee8a7d16516c97b5155c1ff0ca9d20139a8719e81e7d5bbbcd1c573fac720a0000d61abe27cbc08d07da6da700000ec10e718781c1960864401cba"], &(0x7f0000000240)=0xbb) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x3f, 0xfffffffffffeffff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={r2, 0x9, 0x8000, 0x2}, 0x10) 16:29:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, 0x0) 16:29:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf20, 0x0, 0x100020, 0x0) 16:29:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x10000, @ipv4={[], [], @local}, 0x3}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x4, @mcast1}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x7, @mcast2, 0xcdb}, @in6={0xa, 0x4e23, 0x80, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100000000}, @in6={0xa, 0x4e20, 0x3, @loopback, 0x1}], 0xdc) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000840)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)=""/139, &(0x7f0000000140)=0x8b) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x102, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100020, 0x0) 16:29:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x3182}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x3, 0xffffffffffffff0e) socket$inet_sctp(0x2, 0x1, 0x84) r2 = msgget(0x2, 0x101) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000080)=""/49) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0xfff, 0x7, 0x6, 'queue0\x00', 0x6}) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, 0x0) 16:29:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000080)=0x8) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) 16:29:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x200f, 0x0, 0x100020, 0x0) [ 1075.399830][T11041] EXT4-fs: 39 callbacks suppressed [ 1075.399840][T11041] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x109400, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x480443) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000080)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) 16:29:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x349481, 0x0) r1 = semget$private(0x0, 0x1, 0x43e) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000540)=""/4096) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, 0x0) 16:29:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x440, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x8000000) 16:29:42 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) 16:29:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, 0x0) 16:29:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:42 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)) 16:29:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) [ 1076.079172][T11177] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000080)={0x103001, 0x8000}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) r2 = fcntl$getown(r1, 0x9) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) tgkill(r2, r3, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, 0x0) 16:29:42 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:42 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000080)={0x20, 0x9, "8db30122ceac966c395209cec675344e909152a8cace722c4f1d06b74280ce68", 0x100, 0x9, 0x4, 0x9, 0x200}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) 16:29:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x428c0, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xac, 0x400) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x40200, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1e, 0x80083) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000340)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, 0x0) 16:29:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r2 = dup3(r0, r1, 0x80000) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) 16:29:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6000, 0x0, 0x100020, 0x0) 16:29:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) timer_create(0x7, &(0x7f0000000140)={0x0, 0x1c, 0x1, @thr={&(0x7f0000000040)="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", &(0x7f0000000240)="8e8a6b98aa2512588bb75053587b061e509b13aea3e6a8fe488ef28a3e8cdf53a1be2a2897c143948573ff38ef78f070775d93d371b1cb00f9c879c1ea30c5ad8c2d49bb20d37840cdcb9552ae3299d1523d1e8715b9e8cfed0e4eba3702f5aaf702ba67607ec4cff6f3d947b949b40d2f940206acf3c963295572572f56f8818e4c68a86434abc4d65828df28932b4627267ad2f8fa43e01df6ddbfa46dcf73137459cf90fef6e42d20600153a89d6148f5416d97a4153a9b570b3f8d7fd5de145e7b10680fc409e91cc905810e6a2dfdbf122a8c36e15356dcdc2e263e0216d3622ebafc4832d8232f88"}}, &(0x7f0000000180)=0x0) timer_getoverrun(r1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6800, 0x0, 0x100020, 0x0) 16:29:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) connect$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x4, 0x2b, 0x9, 0x2, 0x5, 0x20}}, 0x8) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000040)={0x4, 0x9}) 16:29:43 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) getsockname$tipc(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 16:29:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6c00, 0x0, 0x100020, 0x0) 16:29:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:43 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, 0x0) 16:29:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) ioctl$TIOCNXCL(r1, 0x540d) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffe11, "fd737beff3dd5af53d02e9e072207180dbf857094bbc386eca580809a025625b9fef293c93b2d3287d5bb0e26cd04f9fbc07067e957f481c6eda1a965746d57d97cbcbeaf75b1e8bbaf29dea275746d1474bf87bcf2c560baece3205fd75363392584d2bcacebd21161c4a750365e4c8cf4ec7f3fdac7259454d3f0f24b1165300fb6a66d5f577e150375977848d1ed4f3ca44b1ba5c30"}) 16:29:44 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:44 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xb5c, 0x80000) ioctl$sock_bt_hci(r0, 0x400448e5, &(0x7f0000000540)="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") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffff9c, 0xc004743e, &(0x7f0000001540)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:44 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100020, 0x0) 16:29:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0xa00, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000240)={0x2, 0x2}, 0x2) clock_gettime(0x0, &(0x7f0000003a40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003880)=[{{&(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/236, 0xec}, 0x1}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001540)=""/251, 0xfb}], 0x1, &(0x7f0000001680)=""/216, 0xd8}, 0x88edde2}, {{&(0x7f0000001780)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001800)=""/192, 0xc0}, {&(0x7f00000018c0)=""/202, 0xca}, {&(0x7f00000019c0)=""/104, 0x68}, {&(0x7f0000001a40)=""/159, 0x9f}, {&(0x7f0000001b00)=""/96, 0x60}, {&(0x7f0000001b80)=""/180, 0xb4}], 0x6, &(0x7f0000001cc0)=""/140, 0x8c}, 0x9}, {{&(0x7f0000001d80)=@caif=@dbg, 0x80, &(0x7f0000002080)=[{&(0x7f0000001e00)=""/135, 0x87}, {&(0x7f0000001ec0)=""/110, 0x6e}, {&(0x7f0000001f40)=""/95, 0x5f}, {&(0x7f0000001fc0)=""/160, 0xa0}], 0x4, &(0x7f00000020c0)=""/34, 0x22}, 0x9}, {{0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)=""/173, 0xad}, 0xfffffffeffffffff}, {{&(0x7f0000002200)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000003400)=[{&(0x7f0000002280)=""/186, 0xba}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/191, 0xbf}], 0x3, &(0x7f0000003440)=""/228, 0xe4}, 0x3}, {{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f0000003540)=""/84, 0x54}, {&(0x7f00000035c0)=""/85, 0x55}, {&(0x7f0000003640)=""/150, 0x96}, {&(0x7f0000003700)=""/56, 0x38}], 0x4, &(0x7f0000003780)=""/226, 0xe2}, 0x400}], 0x7, 0x40, &(0x7f0000003a80)={r3, r4+30000000}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000040)=""/98) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r5, 0x4004743b, &(0x7f0000000000)) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000002100), &(0x7f0000003ac0)=0x4) r6 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x7d3, 0x2, 0xffffffffffffffe1, 0x80, 0x0, 0xd3, 0x108, 0xa, 0x0, 0x80, 0x6, 0xd6, 0x0, 0x6, 0x1f, 0x0, 0x62, 0x9, 0x9, 0x1218, 0x4, 0x100, 0x81, 0xfff, 0x81, 0x7ff, 0x4, 0x0, 0x1dd5c33b, 0x8000, 0xfff, 0x4b, 0x3ff, 0x3, 0x0, 0x4, 0x0, 0x1, 0x2, @perf_config_ext={0x400, 0x7fffffff}, 0x18, 0x2, 0x2, 0x0, 0x1, 0x4, 0x5}, r6, 0xb, r2, 0x1) 16:29:44 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:44 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1000, 0x100) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000300)=""/174) 16:29:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xc000, 0x0, 0x100020, 0x0) 16:29:44 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:44 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x18000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x88000, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f00000001c0)=""/199) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setfsuid(r2) 16:29:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x40000, 0x0, 0x100020, 0x0) 16:29:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x20, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:44 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x100) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x100020, 0x0) 16:29:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:44 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2001, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40100, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x100000, 0x0, 0x100020, 0x0) 16:29:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:29:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:45 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 16:29:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x100020, 0x0) 16:29:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82, 0x2) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) 16:29:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) 16:29:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x1, 0x10000, 0x6, 0xbac, 0x8000}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x100020, 0x0) 16:29:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x5) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) ioctl(r0, 0x5, &(0x7f0000000300)="e9e4ecfb6e6e4fd42079d5a5750b127612f6e52eeae2710e1cf44df3dc4df58e2bd5d9d2263070c1182b688f160f246731f195c31f20b936ac45ca65cfe5deada0b882675036933b73ce590a124b72fad667eb0cf83e833ad39ff12a1061bfb4c86040cfb6cefb3d7678dcbaa2968052550c3209d86f88a0ddf20d6cb68358b604a202fcfd6efd8a70b5f7af5aceefe9a14b531560304b21176af2cb8a111d9621c0110e70367a97eb2e9654a9603eb678d9fb12f4f10d798dbe7f78c4593ad7429fc8f7091f3f1018df57118df05f57ea2f7c001f1f5c79f17859e93f6d8ea2f7b6f73dadf68b") sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000540)="0cd76eb9b023a68725d59b1727f783d0cb87f67f4e1692b490194fd061ea6b96b9f77be3be6165a92a9a1af6d2d4fe1392921948b259a57955546c3d19a982408a370e22e890870c1efb8c2e0b7a4b1a1a01181a34be406c41979dbf8ca182c5536be0a8fa4f6ca2a3a32c35f68786e5e8a6490a6da0ac733ac4b2651b41332a0495fd130c0d400d25394c096ce9055c8e3ad5b0522b01ad", 0x98}, {&(0x7f0000000080)="54f98b", 0x3}, {&(0x7f00000000c0)="7046a6ae12979ae49f505efe059b03355f363c6de296aadcba9028739a39b41f95169c3b1c7d744c27d70ca9e88aff78eb", 0x31}, {&(0x7f0000000140)="95fb12a60ddcfede13ceed90e42d55cbcb39d741497c632948a5b107db76d70fd0bf317c68298b47a605e32a97762f6fc7e3e9e4c7b5917deeb91b486b7e560f", 0x40}, {&(0x7f0000000600)="e3f94acf0955e908e41af9bf6478d877ab62cb97e4a1539db4bfa48283aa222f979ace8be95fa71264ed5c015565e4231923b9c46feaa582ca717f13d2acbee66dd34b2688179c75484c2d000419ab3cdbb0e672e00677283a5e7d57bbf0359b8d86143b52ead47ac2359cd73542797f9a6a34747e47a9c34013ba6445fda2042d45f282b6b2b36b2b731883500aae69fe32fc3ec8c8e5", 0x97}, {&(0x7f00000006c0)="e2407d16fda39223238a329ef7c614971eeb05ce236661aab6cd9feb76f357b61568f2484e864dbcb077ea9cf6f6b6fc446c66e297f80f140b666e940b7d485fd317f7161f4f3772949d7a943b713b18f80df9d0e1cda2b3e3c076763c5a8d8ad52ca748c2f5ded5d42e1f3b6d32dfa1a55698ae8d5ca003385ae7e9ad", 0x7d}], 0x6, 0x0, 0x0, 0x400c044}, 0x24000000) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) 16:29:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) fcntl$getflags(r0, 0xb) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x400000, 0x0, 0x100020, 0x0) 16:29:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, 0x0) 16:29:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x381080, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x20, 0x3, 0x0, 0x3, 0x4, 0x100, 0x8, 0x401a, 0xc00, 0xcfac, 0xcf, 0x230b1fdd, 0x200, 0x7f, 0x8, 0x8}}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) getpgrp(r2) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = semget(0x3, 0x1, 0x400) semctl$SEM_STAT(r2, 0x2, 0x12, &(0x7f0000000300)=""/158) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400c0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000200)={0x0, 0x3f}) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x9}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f00000000c0)={0x15, 0x88, &(0x7f00000025c0)="080015c571ac71edd90ff6d4b5b5842b8c75888cb6b22bf2154c02df4a0cbf8a3361da0d5ff0e64541ba064e272be51ccc8223063901882684944a88e69d6186571b27a8ba8e1ac74bf594cb6ca1a93105a5d574fadcab0a7911927ebc7f645c247eae47746b1447f683fb4377b7c22c7dbbb5004bcf9bb210608693c01f449564252de233df9bc7"}) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000540)={0x1, 0x0, 0x2080, {0xf000, 0x0, 0x3}, [], "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", "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"}) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x100020, 0x0) 16:29:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:46 executing program 2: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x0) read(r0, 0x0, 0x3c8) 16:29:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'irlan0\x00', {0x2, 0x4e21, @multicast2}}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x30, 0x0) 16:29:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, 0x0) 16:29:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x1000000000200) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x4, {0x80000000}}, 0x18) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x100000000, 0x20002) openat$cgroup_ro(r2, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) 16:29:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x30, 0x0) 16:29:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, 0x0) 16:29:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1079.918373][T11505] EXT4-fs (sda1): re-mounted. Opts: 16:29:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x30, 0x0) 16:29:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x1) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x100020, 0x0) 16:29:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, 0x0) 16:29:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 16:29:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xa000, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7, 0x40002) 16:29:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, 0x0) [ 1080.198954][T11529] EXT4-fs (sda1): re-mounted. Opts: 16:29:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:46 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 16:29:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, 0x0) 16:29:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x317f) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 16:29:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)) 16:29:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x2, &(0x7f0000000240)=""/174) 16:29:47 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x241) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xd997}, &(0x7f00000000c0)=0x8) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x40a500) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r2, 0xfffffffffffffffe}, 0x8) mkdirat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x1ff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) 16:29:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=""/174) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="c7b1e73c1f56242fab13c7a62596fa148a766269a0aa9fc3f24e57cc7a0a8f7ef120fd8fe669d30a22a576711f148eada7bb4e6732879de25f25d65ebbce97d05c16a57fd787c6aef45d4fd20a6216337772d0238dc3862018e91eac0edc797b2aaf98d7491b9aabcf1a41050cdfcb9123141bd8288530f9fba2023c9b64ae766fba89ab79e91393af1ef8d758e78312620789735b252d3149a5b448228c", 0x9e, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r1, 0xffff, 0x800}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'sha256-arm64-neon\x00'}}, &(0x7f0000000280)="f6213f29e17cc862bce2ad9055465986520fd68952107beed050a93eba974e802472f9aa5b113a5104e9122d7e147b252724c723f031079cfcd53fa554de0e826f33f783b427654f7479125bf44484826c7841e3446a297b38e73cadc8edbb2dfd3d86faa6587e6833f4ce45a138becd1d676e0df0cec02cdbf994682261089bc89c20bb87172ef0975f5abf4bf6df3fd211982cd0cb395e7d757543049abe44dc2ef9c5018d0715cb5b14b38feba026f3eb85e32b0419dbbf508cea468ee5fef90873fc3c3b9c82ed827bcaf5e99cbb8ba03813a956c348ea76348eb1", &(0x7f0000000540)=""/4096) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, 0x0) 16:29:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5421, &(0x7f0000000240)=""/174) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xa9f7, 0x10000) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x8) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5450, &(0x7f0000000240)=""/174) 16:29:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, 0x0) 16:29:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, 0x0) 16:29:47 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000080)={0x0, 0x1}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x2, "9d2e2f3721d8ceb9"}) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x200f0000, 0x0, 0x100020, 0x0) 16:29:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1c5) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xffff, 0x10, 0x6}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r2, 0x9d, "277950dc1f794d1f5b81485386b78ae6fee6780659dca7c6d542a85715b4df599b17ab1df0ca381d0e5083a45589bdb6a3b662989768ebd34966eea5deabdf0d7ecaa7b8f97698ad3391c02711a3b47645330cab44861dd1353ec4872432af4729b500e7056519b19b21dbb0de60bc58c4f6af96fb17c3d43e5f83d0d009eb8fcab98f78de6fb2556eef4ff0951827261f3e0be4b39e6f0943fedcdb39"}, &(0x7f00000000c0)=0xa5) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5451, &(0x7f0000000240)=""/174) 16:29:48 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, 0x0) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000300)=""/174) 16:29:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2000, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x20001) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000240)=0x400) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xa2100, 0x0) 16:29:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5452, &(0x7f0000000240)=""/174) 16:29:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000080)=""/117) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x6) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000000)=""/174) 16:29:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000180)=0xffffffffffffffff) r1 = dup3(r0, r0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000040)={0x28d, 0x6, 0x3, {0xa, @sliced={0x1, [0x400, 0x0, 0x7fff, 0xffffffffffffff80, 0xfffffffffffffd4d, 0x7, 0x2, 0x101, 0x2, 0x100, 0x80, 0x5, 0xfff, 0x8001, 0x8, 0x7, 0xdb00099, 0x4d67, 0x3, 0x9, 0x480000000000000, 0x0, 0x9a6, 0x2, 0x5, 0x3, 0xfff, 0xffffffffffffffc0, 0x93, 0xa7, 0x50000000, 0x10000000000, 0x81, 0x9, 0x2, 0xdd53, 0x978d, 0x9, 0x10000, 0x6, 0x7, 0x3, 0x5, 0x1, 0x774d086a, 0x2f34, 0x7da, 0x1], 0x1}}}) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x60000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5460, &(0x7f0000000240)=""/174) 16:29:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='gid_map\x00') ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0xff, 0xff, 0x5, 0xf796, 0x4, 0x5, 0x4, 0x5}}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x402, 0x100) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f0000000240)={0x5}) getsockname$inet(r3, &(0x7f0000000180)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000300)={0x2, 0x0, [{}, {}]}) 16:29:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000000)=""/174) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x200000) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000200)={0x0, 0x71dfe36e, 0x80000001, [], &(0x7f0000000140)=0x5}) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, 0x0) 16:29:48 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x800, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000240)=""/220) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000180)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x13285effe729c2db) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000340)=""/246) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x6, 0x4, 0x4b2, 0x6, 0x1f}, 0x14) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000100)=0x100) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)=0x2) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000000c0)) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f00000001c0)={0x20, 0x61, &(0x7f0000000840)="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", {0x753, 0xd87, 0x72775753, 0x0, 0x2, 0x8, 0xf, 0x7ff}}) ioctl$FICLONE(r1, 0x40049409, r2) 16:29:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743b, &(0x7f0000000240)=""/174) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x2040, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x3f}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r2, 0xb7c, 0xffffffffffff8001}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000240)=""/199, &(0x7f0000000180)=0xc7) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:49 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0x5, 0x88c5}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$KDENABIO(r0, 0x4b36) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) ioctl$TIOCSTI(r1, 0x5412, 0xffff) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fbb9060770aa51e349b00aef53f14d41dd5258f5ab4b6e707841832be185526437484d227ab78e9cb48fdd15e7d91fcf798993224576d376217ba016bc371de1d8ace65e28ceb3e65352d253fa381a91775db4100ac70c10aead9de9d39db288b17251e7314c8bec71ed85eca12033d5e0e1c2edcd3304a8f6f61967eb19d611bf002ca76f20609f8f0fa4a76bbcdad391a9d281d4674b4b1b2f1df72d248bc482f3997b720891de710100d350e5491e66291ccc54af"], 0xb9, 0x2) r2 = shmget(0x2, 0x3000, 0x20, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000003c0)=""/111) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000004c0)) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, 0x0) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xfffffffffffffffc, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000000c0)={0x8, 0x4, [0x2]}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000080)=0xfffffffffffffffd) 16:29:49 executing program 1: lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'security.', 'GPLGPL\xb6\x00'}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x800) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = msgget(0x2, 0x100) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/12) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000240)=""/174) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x100020, 0x0) 16:29:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:49 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x2) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/59) r1 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setresgid(r1, r2, r3) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)) 16:29:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047440, &(0x7f0000000240)=""/174) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x6, 0x0, 0x10001, 0x8001, 0x8, 0x100, 0x7fff}, 0x0) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x100020, 0x0) 16:29:49 executing program 1: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @remote, @null, 0x1, @bcast}, &(0x7f0000000040)=0x1c, 0x80800) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xc0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40000) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10942, 0x0) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x27, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x242) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) socketpair(0xa, 0x800, 0xfc56, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x33) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000080)) 16:29:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp\x00') ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x400) memfd_create(&(0x7f0000000000)='\x00', 0x0) 16:29:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f00000006c0)=""/174) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, 0x0) 16:29:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047452, &(0x7f0000000240)=""/174) 16:29:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, 0x0) 16:29:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000040)="890bd95db11b40", &(0x7f0000000540)=""/4096}, 0x18) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, 0x0) 16:29:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x781082, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000006c0)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20002, 0x0) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f0000000040)=0x40) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r3, r2}}, 0x18) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000440)='/dev/ppp\x00', 0x9) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000300)={0x8, 0x80000001, 0x90b, 0x5, 0xa9, 0x3}) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000340)="2bd4a7d29573ee2b45e60ee01fe6b4db6c8eb94a3a9b75bdac61a633f75d9b61fbe5e60826e7aafe2e1984eec14c7be3302aa7dbfce92a7a304d5aaa51d623d9c777ac1520ceb5baa26d164391438416cfb274ee37625ba977c35b09e1fbe1393f6c482ac76ac2cfabe11c4321b0640e5e3e9e4457207187e6cc333841e3b5d0bbd8b620125aa7c57bcbdfe32cc767c12efe8ab587ba45fec3943da0440c0d873918b679ae87b580cd3f14a264e20ec04a8e9ab129f07ccda42462d81115c21e9530edd618e76d3218500a5ee69c98", 0xcf) 16:29:50 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xc83, 0x20400) sendto$isdn(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="800000000800000058daa44cae9e5baf24b89a89a40cc0f72be515059ef39f07af26aa89bb6f69e8a3ce31e4739b360f0c13bf0d44ad23ec20a0361448129175a6933443c318ee96348792583f52720cef0b03f9ec5351cafd6fd734e4b997ef267c7d97fde9d80fa22f247b92ba76d5b7adecb34ead77b9c30e68ed2d75abe9d2ecf50bfda67c1e000e9460044e3490dc0752dafec90d85e5868f479149b57d1430431f26ada566aedbc54a9f9e98cfb181c3b84c55f6d0b885ebbe9e6a31132f7d73802ae68a39ae2bb9715e4209cf"], 0xd0, 0x40000, &(0x7f00000001c0)={0x22, 0x1, 0x7, 0x3ff}, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) write$FUSE_DIRENT(r0, &(0x7f0000000200)={0xf8, 0x0, 0x5, [{0x6, 0x3f, 0x24, 0x8, 'mime_type-eth0+[trusted\\vboxnet0eth1'}, {0x5, 0x6, 0x0, 0x7fff}, {0x1, 0x400, 0x9, 0x1ff, '/dev/ppp\x00'}, {0x2, 0x7, 0x0, 0x400}, {0x5, 0x1, 0x2, 0x9, '^]'}, {0x1, 0xc12, 0x12, 0x1, '/dev/input/mouse#\x00'}]}, 0xf8) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x100020, 0x0) 16:29:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, 0x0) 16:29:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$smack_current(r1, &(0x7f0000000080)='/dev/ppp\x00', 0x9) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x93c, 0xffffffff, 0x3ff, 0x3f96311c}, 0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:50 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x12080, 0x0) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40049409, &(0x7f0000000240)=""/174) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f00000018c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001900)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001a00)=0xe8) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x8, &(0x7f0000001700)=[{&(0x7f0000000300)="1c63fb0f2000fd0849e92a564faced10504c0915cf69fa854db2ffbc64cf481a2293632dad182589d5111bd11e19d4c922736c1fdc4c3f71ada64ca29aa05c5f66fd6911111fa64c9e34c3a8ecf22ff124304198960e8409f278ce67ac9d4e5b8282df1e8b7a2475bf1926a9995de28d993fd5b1a052912b0247229a763738ca9ddfb987b56f46b4ec186a2b9a85e0", 0x8f, 0x9}, {&(0x7f0000000240)="6f51e252", 0x4, 0x20}, {&(0x7f0000000540)="be9cbe33567b72f1b57f58f422c17b66e51c2fce6f3d3e262589717dd00dec75e99fe69ab1396bcb4bfc25c208d9fcb01cabe97752bd80eed535c5cb03d30ea71b0708b17d9d770fba3d9a6c6ba0ab44b6435977fe68ba9f13f3a4209282bddeeac9a73619e163005166674c66142bd4a1386619bb2259423bf9c4f18dc5ddf6cfd961994d0ef9b8aafcb71d0bc0eea08c85d7bfc96c05d725ce1ef89068001fab25bfa7c3732d2062fdd56bf65d0645352a60d2a04f7807d898136a6b580adc30ff61e4605101efea60194828fba1c70a169fa44bbea3423480bd033875a987", 0xe0, 0x6}, {&(0x7f0000000640)="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", 0x1000, 0x8}, {&(0x7f0000000280)="57644bf9dd90d595f40789e86dee8507ab9b9d1ec790cd8a1d", 0x19, 0x4}, {&(0x7f0000001640)="fa1444a8b105ab23b88c476fe3bd48a5bf6a13b7aa61da68f503cf8aa223da5a7f99164d769e059ef52dcf1fe273cd4e4ecb3bc17f00feb741aa8ee0040b6514b341b2507228d3d94e973c47ace93f2033c224add7fef0de6e469c6156153a3d4cab014a79ca6a061f7fd405963231f12ffbc5802b1958cce95e1445ee075eaf0246325fe3608d2bba61a792f0d7c71dab329b786cf16abc5e1e0a773678c09eba5497242e5e5e030f59fce6f297bc73c02d93b053d54dcd123d0de9", 0xbc, 0xffffffffffff0001}, {&(0x7f00000003c0)="9f67995f8dce96ed7e411ae5dab8aa9d5ba4225e58a6247cc62093", 0x1b}, {&(0x7f0000000400)="1c441565c06ccf866081a8d0fabf3303ffba9bbf87f640c667e38b5c5629217ce3c8", 0x22, 0x99f4}], 0x1000, &(0x7f0000001a40)={[{@balloc_notest4='block-allocator=notest4'}, {@nolargeio='nolargeio'}, {@balloc_noborder='block-allocator=noborder'}, {@balloc_test4='block-allocator=test4'}, {@hash_r5='hash=r5'}, {@conv='conv'}, {@hash_rupasov='hash=rupasov'}, {@nolargeio='nolargeio'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@subj_type={'subj_type', 0x3d, 'TIPCv2\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'TIPCv2\x00'}}, {@fowner_lt={'fowner<', r2}}, {@permit_directio='permit_directio'}, {@audit='audit'}, {@pcr={'pcr'}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@fowner_gt={'fowner>', r3}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r1, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa19}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x44) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x100001000100, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) clock_gettime(0x5, &(0x7f0000000300)) faccessat(r1, &(0x7f0000000200)='./file0\x00', 0x2, 0x400) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x4080, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000300)=0x1a) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x802) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x10000, 0x0, [0xfffffffffffffffd, 0x6, 0x81, 0xfffffffffffffc00, 0x6, 0x80000000, 0x100000000, 0x58a]}) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f00000000c0)) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) sendfile(r2, r0, &(0x7f0000000140), 0xc24) 16:29:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f0000000240)=""/174) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x40002, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0x36, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000001540)=""/246) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f00000001c0)='.,\x00', 0xffffffffffffffff}, 0x30) ptrace$getregset(0x4204, r4, 0x200, &(0x7f00000000c0)={&(0x7f0000000540)=""/4096, 0x1000}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000088fe675f45fc6a6cca689ab2510afd4cf58eb4bbcc154c4119a1bf9f2f6cd8a8be9ad06e6fe14ed4e8f45f6c0e7735cd4cb53cabf219120b8d16ae38c329711cfd2b503cf8d0976fc2443a11f7427b00a54b07a8b64a4ca5604bcd8343dcf2eef2c1cdbe27749725217e9d1cee442f56254a9bce", @ANYRES16=r5, @ANYBLOB="020727bd7000fbdbdf25050000002c00070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2], 0x40}, 0x1, 0x0, 0x0, 0x4810}, 0x1) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4000, 0x0) accept4$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80000) 16:29:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x100020, 0x0) 16:29:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x5) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x202, 0x8) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:51 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2001fe, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x1) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/92) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x4, 0x100000000]}, 0x8) 16:29:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000240)=""/174) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) timer_create(0x6, &(0x7f0000000000)={0x0, 0x26, 0x3, @thr={&(0x7f0000000080)="c451e2cf26cc6b632291b50e1b23819e94994573614bbda74046a86bb7ed6f6763b4edb7e0c352d9935fb205f574a02ce194aaa27669a025c84f9bf426b042bf963214f44eb44f2121ba1013bad35e14fd45c628483cb96366a01b0b4ce726d27776b11542607d624fc6f1cd3ac443b7f2b54a3813899caa0ed9105eb8b1c0ea40d320616c3919d6f2d18293a14eb227b3d0381072d022b942b1da07652b5a93", &(0x7f0000000140)="d18f778bc6e8dea09b09edbbbe8d3177a93227f431fb2e8d2216a20c007381e83dbcc5ceb74e372d10239f7bcc55c828e327847c28eeada71a787b901d0d87a1058f0b31d17ca119c71478706171f3"}}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {r2, r3+30000000}}, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000002c0)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x2) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4020940d, &(0x7f0000000240)=""/174) 16:29:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000140)={r2, &(0x7f00000000c0)=""/64}) 16:29:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xeb234aebde312759, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000d00)={"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"}) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) r4 = socket(0x2, 0x80802, 0x4) bind$vsock_stream(r4, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000140)) r5 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x10d742) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f00000000c0)=0x100000, 0x4) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000240)=""/174) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast2, 0x20, 0x0, 0x1, 0x3, 0x8000, 0x8d}, 0x20) r2 = dup3(r0, r0, 0x80000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000000)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xc0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x4001, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80000) 16:29:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, 0x0) 16:29:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x7bffd, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000400)={[], 0x3f, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x6000, [], 0x100}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80080}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x110, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9ac}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf7}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf2d2}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 16:29:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x101002, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000740)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3af79033, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000300)=0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xd, 0x40000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000700)={0x5, &(0x7f0000000400)=[{}, {}, {}, {}, {}]}) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f00000003c0)={0x3, 0x1, [0x20, 0x5, 0xa91c, 0x3, 0x9, 0x2c9bb9ce, 0x3, 0x9]}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000840)=@int=0xf4f5993, 0x4) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000040)=0x1f, 0x12) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000d00)=""/174) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x30000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000180)) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x800000000003b41, 0x40) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x82202, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000280)={"6414fc80cb8dc6a79c18c55a2fde6d9e33c23cd5689f2938924bd6b6a5208738c71b907b1f8b423bfa31d9847804492ae289e25fd972476da688273091faca44781c5187dc3d520ba1189d60058aa3f5994a87449f937a1d0b89dc69712e62d6069778d29765b4586a0f8c0b735e5a24c741d303611f00b0ac2bc894ace859fe244afbcc6d654e4e40809c02551d43f8fbfc2d6386bd19a6b6f8333aa03409e62ba880f37149e11fc26d6be67e788c0f4ade6284a2a18ac1eb2ad29570f8aca209934b4a9c3284fee94bae5b814b151ba4324a4d008cd35698e889d288f9d163e8e85ed1939d687a236bda1ec8795c3ff913f30dd56a326fd57a41fdeec48684b62e7001bc9cfe177a20f3fb0b748ab55271c1c6aa03c1dfdfc4a5c5fcbbc4213a2450aa2ec181364be351362d90696abf9cfec0389e7628a169bdfcbcecc8ca37ed2de431a94f6bce4000d0a143573767242953b1d6183eb9045d596be99cfe8f80be68f27ae3dcb7cce248a76894fb8381e05974155b11fd277c2f877eeb20c7a724fb88203207a30d3747857855e0b622522683669847dfd660ab7cc5c46854e1e29236191a05ea4088f94891e7a1b8152556eb4003cfef77a7b3f2af752d1a47e4be444fbae4ced1c2401d015602fcbbb28b79693bdc3c301b664d3ec1981e4efb9c4ce54dde1176c0bc13d44c6ddf05443074bdb201c9574bb59c1b99c5bc4ace631c290bcec19f176985afc52cb7c730965b096291b1efe43d0f0badaf736f43dcc674cef5d4eccda1c20d6a7832e4b7c72701cb86b17d76b7b0903f51f8f0ef45f86f7268bb87f9f2ce9b7684a971a90c700b04860bf9256e1a12bebc4b63a5f5e0777eb5567e5e8d38d988cfc0cb5526071bb275288e8288682fa05c1614fcffe5b7505542d7acf434d1a9cea9a906fd6dd08ed990cb3ec8414fbdcdfd07aa2f64d6713a5f7d37653520ba5db2dc268125b036268ec7aaf928ab67ed3930e7bdbb9f996edf7b831a114dd33c6fed4a45de44ff671096656f2976ff7b4df8881ff0c7b77b5dd93370849136bc954cb18159658c04d744b061f01dba771560f8b67a56dc756f353dc92e292be4a41fce7005a6eaf6f8943587613151cfc00312ccc8df074bdc5f4a6589252651e1bebc436999ca66dd5ebf559b9371526190b54b648f7beef18b9c3e300dcf3965ecfec5af2bde48e3fd85e8b6551f2db31a7266a96f237ea6fff530e2a4c7102e0d2a50f9a2565e7afc445a49fdfac2f4117684e88951fe5979c4b018d29a60f915d4359d5cdff2be00d368e1fc9be1bcd68e37a7bc3b5d19909cdf0c998724f2275b5c067d142b3ebdd7a24fd11e4ade704419fb088ceef3710f5262bda6eb6f198a5cd316b196955bab0a99fd6d9be393e9d266114ba37548deeae87f57b69e9f1f0b85890e9752bd84af3648f98b"}) ioctl$SIOCNRDECOBS(r1, 0x89e2) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000680)={"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"}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffc, 0x208001) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0x7, 0x3, 0x101, 0x1}, 'syz0\x00', 0x23}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8004745a, &(0x7f0000000240)=""/174) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$getregset(0x4204, r1, 0x3, &(0x7f0000000180)={&(0x7f0000000080)=""/244, 0xf4}) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) 16:29:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) socketpair$tipc(0x1e, 0x40007, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r1, &(0x7f0000000140)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x3}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000000)=""/174) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x200f000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000240)=""/174) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x1f, 0x7fff, 0xeb, 0x9, 0x0, 0x5, 0x100, 0x3, 0x200, 0x965a, 0xfffffffffffffffa, 0x7, 0x9, 0x64b8, 0xfffffffffffffff9, 0x100, 0x6, 0x3ff, 0x68f, 0x6, 0x24f6f4f0, 0x20, 0x6, 0x5, 0x7, 0x1c66, 0x7, 0x100, 0x8, 0x7, 0x4, 0xfac, 0xffffffffffffffff, 0xffffffff, 0x25, 0xe2ff, 0x0, 0x0, 0x5, @perf_config_ext={0xfffffffffffffff8, 0xe9}, 0x1, 0x3, 0xffffffff80000001, 0x6, 0x3ff, 0x1, 0x2}, r1, 0xd, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x4, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, 0x0) 16:29:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) chroot(&(0x7f0000000000)='./file0\x00') 16:29:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x2, 0x400, 0x100000001, 0x3}, 0x8) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:29:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001280)=ANY=[@ANYBLOB="0800000000040000000000000000000004000000050000000200000000000000db000000000000000200000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000be0000000000000005000000000000000000000000000000000000000000000004e23e79c700006810e774d9a28a0d5ad217e90000000ef40ab20c150000000000000000000000000000000000"]) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x3, 0x40, 0x1f, 0x4}]}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r2 = dup(r0) write$UHID_INPUT(r2, &(0x7f0000000240)={0x8, "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", 0x1000}, 0x1006) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/123, 0x7b) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup(r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x100, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x28000, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000080)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000300), &(0x7f0000000200)=0x60) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x50400, 0x0) 16:29:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000040)={0x1}, 0x8) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = dup2(r0, r0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x9, 0x1e, 0x1f, 0x9, "4d59a349fb46273bf8b8ebbcc8ff44d9d832204f633bd693d8fe5666247c513d"}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000380)=0xe8) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = getegid() r10 = getgid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) r13 = getgid() r14 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000010002000000000002000200", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="c04faf8eb1f4a216af7ff17e0d089b46a83c8ad355cf822067a411f6d67359c1dca4ed2b01c59e524dc8b224b99456dc07c3aa7fb4b11e0c5f2150ed4b5c73c10c0c0651de95024ce4e76ccbab64878f06fda2b53c853b17a98402618a536a7672ad182ee72d90734bb05f358d1f2a1fdd60d0f3292e553d2d6991d9d25a24f660a465297dcefeb7ca57c1cd08a08e0eadb740184ad92748037d739dd9cdd4327742f28b6ad114138418fd10e0ce0984d46e580f718656b4eb", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="04007cc60000000008000000", @ANYRES32=r8, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r9, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="10000400000000002000010000000000"], 0x8c, 0x2) 16:29:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x400000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000340)={0xf, 0x1f, 0x2, 0x8}, 0xf) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400c2, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x4e2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x13f, 0xd}}, 0x20) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000040)={'sit0\x00', 0xb5}) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc020660b, &(0x7f0000000240)=""/174) 16:29:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x100020, 0x0) 16:29:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0xfffffffffffffffc, 0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x440000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:54 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x80000) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000080)=""/29, 0x241dbb9d}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/246) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x35, 0x2, 0xe, 0x6, 0xa, 0x7, 0x0, 0x11c}) ioctl$int_out(r0, 0x2, &(0x7f0000000200)) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x9, 0x1}, 0x8) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:54 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40900, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/187) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0xfffe, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x8100, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x80000000000001, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, 0x0) 16:29:54 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) getgroups(0x3, &(0x7f00000006c0)=[0xee00, 0xee01, 0xffffffffffffffff]) r9 = syz_open_dev$sndpcmp(&(0x7f0000000780)='/dev/snd/pcmC#D#p\x00', 0x5cd, 0x40) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r9, 0x111, 0x3, 0x0, 0x4) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x6}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x6, r4}, {0x2, 0x6, r5}, {0x2, 0x7, r6}], {0x4, 0x4}, [{0x8, 0x2, r7}, {0x8, 0x2, r8}], {0x10, 0x1}}, 0x5c, 0x2) 16:29:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x210000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000001c0)={0x20, "fd420e3c7f915b4c1ef8b567338f774732d2286ecd7d85a7f42864b1f8e5d0f1", 0xe28, 0x6, 0x6, 0x10, 0x3}) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x3, @loopback}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e20, 0x101, @empty, 0xffffffffffffffff}], 0x48) 16:29:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, 0x0) 16:29:55 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x3, 0x1}}, 0x10) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) [ 1088.570596][T15132] FAULT_INJECTION: forcing a failure. [ 1088.570596][T15132] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.635992][T15132] CPU: 1 PID: 15132 Comm: syz-executor5 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1088.645042][T15132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.655092][T15132] Call Trace: [ 1088.658389][T15132] dump_stack+0x172/0x1f0 [ 1088.662752][T15132] should_fail.cold+0xa/0x15 [ 1088.667355][T15132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1088.673181][T15132] ? lock_downgrade+0x880/0x880 [ 1088.678093][T15132] ? ___might_sleep+0x163/0x280 [ 1088.682960][T15132] __should_failslab+0x121/0x190 [ 1088.687908][T15132] should_failslab+0x9/0x14 [ 1088.692462][T15132] kmem_cache_alloc_trace+0x2d1/0x760 [ 1088.697842][T15132] ? lock_downgrade+0x880/0x880 [ 1088.702705][T15132] slhc_init+0xa2/0x52a [ 1088.706869][T15132] ppp_ioctl+0x1120/0x25ee [ 1088.711287][T15132] ? zap_class+0x460/0x460 [ 1088.715711][T15132] ? ppp_write+0x280/0x280 [ 1088.720157][T15132] ? __fget+0x340/0x540 [ 1088.724318][T15132] ? find_held_lock+0x35/0x130 [ 1088.729087][T15132] ? __fget+0x340/0x540 [ 1088.733253][T15132] ? ppp_write+0x280/0x280 [ 1088.737693][T15132] do_vfs_ioctl+0xd6e/0x1390 [ 1088.742296][T15132] ? ioctl_preallocate+0x210/0x210 [ 1088.747420][T15132] ? __fget+0x367/0x540 [ 1088.751628][T15132] ? ksys_dup3+0x3e0/0x3e0 [ 1088.756048][T15132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1088.762285][T15132] ? fput+0x128/0x1a0 [ 1088.766317][T15132] ? security_file_ioctl+0x93/0xc0 [ 1088.771452][T15132] ksys_ioctl+0xab/0xd0 [ 1088.775619][T15132] __x64_sys_ioctl+0x73/0xb0 [ 1088.780217][T15132] do_syscall_64+0x103/0x610 [ 1088.784831][T15132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.790743][T15132] RIP: 0033:0x457e39 [ 1088.794637][T15132] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.814236][T15132] RSP: 002b:00007f458665fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.822651][T15132] RAX: ffffffffffffffda RBX: 00007f458665fc90 RCX: 0000000000457e39 16:29:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, 0x0) [ 1088.830634][T15132] RDX: 0000000020000240 RSI: 0000000040047451 RDI: 0000000000000003 [ 1088.838615][T15132] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1088.846584][T15132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45866606d4 [ 1088.854564][T15132] R13: 00000000004bfe62 R14: 00000000004d1920 R15: 0000000000000004 16:29:55 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x141000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r1, 0x1c, 0x1, @ib={0x1b, 0x7f, 0x80000001, {"3944925a2ee5dd71ff5821e6af957c56"}, 0x4, 0x0, 0x1}}}, 0xa0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x80000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r2, 0x40047459, &(0x7f0000000240)=""/174) 16:29:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x600040) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000300)) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="964c335b", @ANYRES16=r2, @ANYBLOB="0c0528bd7000fddbdf2508000000100002000400040008000100d7e3381f"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) 16:29:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) write$binfmt_aout(r0, &(0x7f0000000540)={{0x10b, 0x401, 0x4, 0x1e3, 0x379, 0x6, 0x152, 0xfffffffffffff9b8}, "89f962eb03acf27b8707de140576d0ab520cb9a6fcaf6fae3a455908d623b0762273be1ad29667f81a6cd7873e9c29fa61a6f0fac77311a27f3a77a12f0af5e392b1d45e8cbcbd06d2666bddc82e0985eb5a29637682d64e30205cccf32d96338be64a3c80f346c67cf6fa162ea3d459817e4ce77327083598f12a3c4b53b612df4d16ac21b9c4e94b5247dd803246a96897baa0b4d70055c665b7ba44d3d519ea91ac1009aa97142d9241912d07c8a34f2801c57ab6761946da1ef6d443d4f9392269fb79b177258a58386d81bffdf0b64cdca0818048609e10e72a779b1afcaa3209fcc8db3cb10db143b63a4f0408fb2fe3f518bc", [[], [], [], [], [], [], [], []]}, 0x916) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc010}, 0x20004000) 16:29:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100002, 0x0) 16:29:55 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) [ 1089.229933][T15437] FAULT_INJECTION: forcing a failure. [ 1089.229933][T15437] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.249997][T15437] CPU: 0 PID: 15437 Comm: syz-executor5 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1089.259037][T15437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.269125][T15437] Call Trace: [ 1089.272555][T15437] dump_stack+0x172/0x1f0 [ 1089.276951][T15437] should_fail.cold+0xa/0x15 [ 1089.281556][T15437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1089.287365][T15437] ? lock_downgrade+0x880/0x880 [ 1089.287385][T15437] ? ___might_sleep+0x163/0x280 [ 1089.287421][T15437] __should_failslab+0x121/0x190 [ 1089.302013][T15437] should_failslab+0x9/0x14 [ 1089.302031][T15437] __kmalloc+0x2dc/0x740 [ 1089.302052][T15437] ? kmem_cache_alloc_trace+0x354/0x760 [ 1089.310773][T15437] ? lock_downgrade+0x880/0x880 [ 1089.310792][T15437] ? slhc_init+0x1cc/0x52a [ 1089.310812][T15437] slhc_init+0x1cc/0x52a [ 1089.310833][T15437] ppp_ioctl+0x1120/0x25ee [ 1089.334211][T15437] ? zap_class+0x460/0x460 [ 1089.338638][T15437] ? ppp_write+0x280/0x280 [ 1089.343053][T15437] ? __fget+0x340/0x540 [ 1089.347313][T15437] ? find_held_lock+0x35/0x130 [ 1089.352080][T15437] ? __fget+0x340/0x540 [ 1089.356251][T15437] ? ppp_write+0x280/0x280 [ 1089.360681][T15437] do_vfs_ioctl+0xd6e/0x1390 [ 1089.365284][T15437] ? ioctl_preallocate+0x210/0x210 [ 1089.370428][T15437] ? __fget+0x367/0x540 [ 1089.374610][T15437] ? ksys_dup3+0x3e0/0x3e0 [ 1089.379030][T15437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1089.385270][T15437] ? fput+0x128/0x1a0 [ 1089.389269][T15437] ? security_file_ioctl+0x93/0xc0 [ 1089.394390][T15437] ksys_ioctl+0xab/0xd0 [ 1089.398600][T15437] __x64_sys_ioctl+0x73/0xb0 [ 1089.403199][T15437] do_syscall_64+0x103/0x610 [ 1089.407803][T15437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.413689][T15437] RIP: 0033:0x457e39 [ 1089.417600][T15437] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.437223][T15437] RSP: 002b:00007f458665fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.445650][T15437] RAX: ffffffffffffffda RBX: 00007f458665fc90 RCX: 0000000000457e39 [ 1089.453624][T15437] RDX: 0000000020000240 RSI: 0000000040047451 RDI: 0000000000000003 [ 1089.461594][T15437] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1089.469589][T15437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45866606d4 [ 1089.477566][T15437] R13: 00000000004bfe62 R14: 00000000004d1920 R15: 0000000000000004 16:29:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100003, 0x0) 16:29:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syncfs(r2) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="009500e5ffffff000088eaec9f000000000000000000000000000000ab19a218aedd364799ce6112a493d009957c4891677b13be7d1b0fad562695b0ae9b5f6b851586ee2bebe6cffb42abf14016aafb44fa4d6d5af963e99e750f07000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000040)={r1, r3}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2042, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r6, &(0x7f00000005c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r7, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4080) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e1, &(0x7f0000000100)={r1}) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000600)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$EVIOCGREP(r8, 0x40107447, &(0x7f0000000300)=""/174) [ 1089.619239][T15451] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:29:56 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9f, 0x0) write$tun(r1, &(0x7f0000000080)={@val={0x0, 0x60f7}, @void, @llc={@snap={0xaa, 0xaa, "1e01", "78f985", 0x8809, "607c21d64ebe786346b85a25252edf72264f156e4c9331edcc6e310be9157b89f62fd71e51bfc45cbc2de61d30a792a7a7c0fb5c2e6b961fb3f9"}}}, 0x47) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, 0x0) 16:29:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0b000000edc8"], 0x4, 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x200, 0x200) bind$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x0, @rand_addr=0x336e}}, 0x1e) 16:29:56 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = open(&(0x7f0000000140)='./file0\x00', 0x75ef2b4af3a045e2, 0x1a1) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000040)=""/174) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xe1, 0x80000) 16:29:56 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1089.928612][T15664] FAULT_INJECTION: forcing a failure. [ 1089.928612][T15664] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.964383][T15664] CPU: 1 PID: 15664 Comm: syz-executor4 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1089.973440][T15664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.983508][T15664] Call Trace: [ 1089.986814][T15664] dump_stack+0x172/0x1f0 [ 1089.991170][T15664] should_fail.cold+0xa/0x15 [ 1089.995810][T15664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1089.995831][T15664] ? lock_downgrade+0x880/0x880 [ 1089.995852][T15664] ? ___might_sleep+0x163/0x280 [ 1089.995875][T15664] __should_failslab+0x121/0x190 [ 1089.995895][T15664] should_failslab+0x9/0x14 [ 1089.995926][T15664] kmem_cache_alloc+0x2be/0x710 16:29:56 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@generic={0x1, 0xfffffffffffffffd, 0x6}) [ 1089.995957][T15664] getname_flags+0xd6/0x5b0 [ 1089.995986][T15664] user_path_at_empty+0x2f/0x50 [ 1090.011504][T15664] do_mount+0x150/0x2c40 [ 1090.011537][T15664] ? wait_for_completion+0x440/0x440 [ 1090.011568][T15664] ? copy_mount_string+0x40/0x40 [ 1090.021073][T15664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.021087][T15664] ? fput+0x128/0x1a0 [ 1090.021107][T15664] ? ksys_write+0x166/0x1f0 [ 1090.021122][T15664] ? copy_mount_options+0x30e/0x440 [ 1090.021149][T15664] ksys_mount+0xdb/0x150 [ 1090.035343][T15664] __x64_sys_mount+0xbe/0x150 [ 1090.035366][T15664] do_syscall_64+0x103/0x610 [ 1090.035390][T15664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.035413][T15664] RIP: 0033:0x457e39 [ 1090.035428][T15664] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.035438][T15664] RSP: 002b:00007f0c82924c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 16:29:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, 0x0) 16:29:56 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1090.035453][T15664] RAX: ffffffffffffffda RBX: 00007f0c82924c90 RCX: 0000000000457e39 [ 1090.035462][T15664] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000000 [ 1090.035472][T15664] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1090.035482][T15664] R10: 0000000000000030 R11: 0000000000000246 R12: 00007f0c829256d4 [ 1090.035491][T15664] R13: 00000000004c3c7e R14: 00000000004d6e28 R15: 0000000000000003 16:29:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1090.296500][T15885] FAULT_INJECTION: forcing a failure. [ 1090.296500][T15885] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.309389][T15885] CPU: 0 PID: 15885 Comm: syz-executor4 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1090.318455][T15885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.328520][T15885] Call Trace: [ 1090.331819][T15885] dump_stack+0x172/0x1f0 [ 1090.336184][T15885] should_fail.cold+0xa/0x15 [ 1090.340790][T15885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1090.346597][T15885] ? lock_downgrade+0x880/0x880 [ 1090.351460][T15885] ? ___might_sleep+0x163/0x280 [ 1090.356338][T15885] __should_failslab+0x121/0x190 [ 1090.361309][T15885] should_failslab+0x9/0x14 [ 1090.365830][T15885] kmem_cache_alloc_trace+0x2d1/0x760 [ 1090.371246][T15885] ? apparmor_capable+0x2ed/0x630 [ 1090.376271][T15885] ? cap_capable+0x205/0x270 [ 1090.380883][T15885] alloc_fs_context+0x5a/0x640 [ 1090.385649][T15885] fs_context_for_reconfigure+0x73/0x90 [ 1090.391201][T15885] do_mount+0x8ba/0x2c40 [ 1090.395449][T15885] ? wait_for_completion+0x381/0x440 [ 1090.400763][T15885] ? copy_mount_string+0x40/0x40 [ 1090.405701][T15885] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.411935][T15885] ? fput+0x128/0x1a0 [ 1090.415921][T15885] ? ksys_write+0x166/0x1f0 [ 1090.420436][T15885] ? copy_mount_options+0x30e/0x440 [ 1090.425644][T15885] ksys_mount+0xdb/0x150 [ 1090.429890][T15885] __x64_sys_mount+0xbe/0x150 [ 1090.434594][T15885] do_syscall_64+0x103/0x610 [ 1090.439191][T15885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.445079][T15885] RIP: 0033:0x457e39 [ 1090.448977][T15885] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.468581][T15885] RSP: 002b:00007f0c82924c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1090.476990][T15885] RAX: ffffffffffffffda RBX: 00007f0c82924c90 RCX: 0000000000457e39 [ 1090.484955][T15885] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000000 16:29:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x400004, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0xe, [], 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)=""/14}, &(0x7f0000000280)=0x78) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f00000000c0)={@broadcast, @dev, @multicast2}, &(0x7f0000000100)=0xc) 16:29:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:29:57 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1090.492922][T15885] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1090.500964][T15885] R10: 0000000000000030 R11: 0000000000000246 R12: 00007f0c829256d4 [ 1090.508929][T15885] R13: 00000000004c3c7e R14: 00000000004d6e28 R15: 0000000000000003 16:29:57 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000600)=""/174) 16:29:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x400, 0x0, 0x5, 0x6, 0x20, 0x77d591e9}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, 0x0) [ 1090.649558][T15897] FAULT_INJECTION: forcing a failure. [ 1090.649558][T15897] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.712040][T15897] CPU: 0 PID: 15897 Comm: syz-executor4 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1090.721075][T15897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.731130][T15897] Call Trace: [ 1090.734446][T15897] dump_stack+0x172/0x1f0 [ 1090.738803][T15897] should_fail.cold+0xa/0x15 [ 1090.743427][T15897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1090.749239][T15897] ? lock_downgrade+0x880/0x880 [ 1090.754098][T15897] ? ___might_sleep+0x163/0x280 [ 1090.758988][T15897] __should_failslab+0x121/0x190 [ 1090.763928][T15897] should_failslab+0x9/0x14 [ 1090.768449][T15897] kmem_cache_alloc_trace+0x2d1/0x760 [ 1090.773850][T15897] ? apparmor_capable+0x2ed/0x630 [ 1090.778883][T15897] ? cap_capable+0x205/0x270 [ 1090.783479][T15897] alloc_fs_context+0x5a/0x640 [ 1090.788250][T15897] fs_context_for_reconfigure+0x73/0x90 [ 1090.793834][T15897] do_mount+0x8ba/0x2c40 [ 1090.798081][T15897] ? wait_for_completion+0x381/0x440 [ 1090.803374][T15897] ? copy_mount_string+0x40/0x40 [ 1090.808331][T15897] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.814573][T15897] ? fput+0x128/0x1a0 [ 1090.818564][T15897] ? ksys_write+0x166/0x1f0 [ 1090.823073][T15897] ? copy_mount_options+0x30e/0x440 [ 1090.828282][T15897] ksys_mount+0xdb/0x150 [ 1090.832531][T15897] __x64_sys_mount+0xbe/0x150 [ 1090.837216][T15897] do_syscall_64+0x103/0x610 [ 1090.841813][T15897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.847704][T15897] RIP: 0033:0x457e39 [ 1090.851602][T15897] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.871204][T15897] RSP: 002b:00007f0c82924c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1090.879617][T15897] RAX: ffffffffffffffda RBX: 00007f0c82924c90 RCX: 0000000000457e39 [ 1090.887592][T15897] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000000 [ 1090.895591][T15897] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1090.903563][T15897] R10: 0000000000000030 R11: 0000000000000246 R12: 00007f0c829256d4 16:29:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1b82, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={{0xffffffffffffff80, 0x0, 0x7, 0x7, 0x400}, 0x400}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000c40)=ANY=[@ANYBLOB="b0030000", @ANYRES16=r2, @ANYBLOB="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"], 0x3b0}, 0x1, 0x0, 0x0, 0x8000000000040}, 0x8000) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) [ 1090.911549][T15897] R13: 00000000004c3c7e R14: 00000000004d6e28 R15: 0000000000000003 16:29:57 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40000, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@can={0x1d, 0x0}, &(0x7f0000000540)=0x80) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000580)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x6, 0x4) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:57 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x2, &(0x7f0000000240)=""/174) 16:29:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x10003a, 0x0) 16:29:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = eventfd(0x3c2345fa) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x5000, &(0x7f0000000040), 0x6, r1}) [ 1091.111797][T16017] FAULT_INJECTION: forcing a failure. [ 1091.111797][T16017] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.170096][T16017] CPU: 1 PID: 16017 Comm: syz-executor4 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1091.179130][T16017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.189189][T16017] Call Trace: [ 1091.192493][T16017] dump_stack+0x172/0x1f0 [ 1091.196853][T16017] should_fail.cold+0xa/0x15 [ 1091.201454][T16017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.207270][T16017] ? __lock_acquire+0x54b/0x4790 [ 1091.212240][T16017] __should_failslab+0x121/0x190 [ 1091.217199][T16017] should_failslab+0x9/0x14 [ 1091.221711][T16017] kmem_cache_alloc+0x47/0x710 [ 1091.226535][T16017] ? ___might_sleep+0x163/0x280 [ 1091.231420][T16017] ? mempool_alloc+0x380/0x380 [ 1091.236194][T16017] mempool_alloc_slab+0x47/0x60 [ 1091.241092][T16017] mempool_alloc+0x16b/0x380 [ 1091.245694][T16017] ? check_preemption_disabled+0x48/0x290 [ 1091.251468][T16017] ? mempool_destroy+0x40/0x40 [ 1091.256235][T16017] ? debug_smp_processor_id+0x1c/0x20 [ 1091.261620][T16017] ? zap_class+0x460/0x460 [ 1091.266073][T16017] bio_alloc_bioset+0x3bf/0x680 [ 1091.270962][T16017] ? __lock_is_held+0xb6/0x140 [ 1091.275738][T16017] ? bvec_alloc+0x2f0/0x2f0 [ 1091.280259][T16017] submit_bh_wbc+0x133/0x7f0 [ 1091.284859][T16017] ? __unlock_page_memcg+0x70/0x100 [ 1091.290073][T16017] __sync_dirty_buffer+0x111/0x2e0 [ 1091.295215][T16017] ext4_commit_super+0x7a2/0xba0 [ 1091.300192][T16017] ? ext4_setup_system_zone+0xfe/0x510 [ 1091.305685][T16017] ext4_remount+0x16f0/0x2190 [ 1091.310512][T16017] ? ext4_register_li_request+0x7f0/0x7f0 [ 1091.316238][T16017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.322476][T16017] ? shrink_dentry_list+0x319/0x720 [ 1091.327678][T16017] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1091.333428][T16017] ? find_next_bit+0x107/0x130 [ 1091.338238][T16017] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1091.344484][T16017] ? shrink_dentry_list+0x720/0x720 [ 1091.349684][T16017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.355930][T16017] ? apparmor_capable+0x2ed/0x630 [ 1091.360960][T16017] ? cap_capable+0x205/0x270 [ 1091.365593][T16017] ? ext4_register_li_request+0x7f0/0x7f0 [ 1091.371340][T16017] legacy_reconfigure+0x113/0x170 [ 1091.376373][T16017] reconfigure_super+0x2d0/0x900 [ 1091.381323][T16017] ? fs_umode_to_dtype+0xb0/0xb0 [ 1091.386269][T16017] do_mount+0x1650/0x2c40 [ 1091.390605][T16017] ? wait_for_completion+0x381/0x440 [ 1091.395920][T16017] ? copy_mount_string+0x40/0x40 [ 1091.400869][T16017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.407124][T16017] ? fput+0x128/0x1a0 [ 1091.411143][T16017] ? ksys_write+0x166/0x1f0 [ 1091.415663][T16017] ? copy_mount_options+0x30e/0x440 [ 1091.420869][T16017] ksys_mount+0xdb/0x150 [ 1091.425123][T16017] __x64_sys_mount+0xbe/0x150 [ 1091.429836][T16017] do_syscall_64+0x103/0x610 [ 1091.434450][T16017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.440369][T16017] RIP: 0033:0x457e39 [ 1091.444278][T16017] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:29:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0x2ab, 0x1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1091.463882][T16017] RSP: 002b:00007f0c82924c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1091.472346][T16017] RAX: ffffffffffffffda RBX: 00007f0c82924c90 RCX: 0000000000457e39 [ 1091.480347][T16017] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000000 [ 1091.488382][T16017] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1091.496374][T16017] R10: 0000000000000030 R11: 0000000000000246 R12: 00007f0c829256d4 [ 1091.504371][T16017] R13: 00000000004c3c7e R14: 00000000004d6e28 R15: 0000000000000003 16:29:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5421, &(0x7f0000000240)=""/174) [ 1091.538701][T16017] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:58 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2200, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)) [ 1091.583325][T16101] EXT4-fs (sda1): re-mounted. Opts: 16:29:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)) [ 1091.651062][T16228] EXT4-fs (sda1): re-mounted. Opts: 16:29:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100060, 0x0) 16:29:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6000, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x400, 0x4) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1091.779230][T16274] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:29:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7356, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r2, 0x1}}, 0x18) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000580)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) recvfrom$rose(r1, &(0x7f0000000140)=""/174, 0xae, 0x1, &(0x7f0000000540)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) [ 1091.922036][T16442] EXT4-fs (sda1): re-mounted. Opts: 16:29:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5450, &(0x7f0000000240)=""/174) [ 1091.984646][T16448] EXT4-fs (sda1): re-mounted. Opts: [ 1092.006384][T16446] EXT4-fs (sda1): re-mounted. Opts: (null) 16:29:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'vcan0\x00', 0x4}, 0x18) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x8401, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x14000, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x101020, 0x0) 16:29:58 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0xb40, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200040) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000480)=""/174) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000240)=""/227) 16:29:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x2, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x5, 0x2}) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000300)=""/174) [ 1092.207753][T16640] QAT: Invalid ioctl [ 1092.240395][T16665] QAT: Invalid ioctl 16:29:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5451, &(0x7f0000000240)=""/174) 16:29:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f00000000c0)={@rand_addr, @initdev, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) r6 = accept(r0, &(0x7f0000000b40)=@ethernet={0x0, @remote}, &(0x7f0000000a80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000800)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000ac0)={@dev, 0x0}, &(0x7f0000000b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001f80)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002080)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000002180)={@loopback, 0x0}, &(0x7f00000021c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0}, &(0x7f0000002240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002440)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002480)={{{@in=@initdev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000002580)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000009040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000090c0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f0000009100)={@mcast1, 0x0}, &(0x7f0000009140)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000009180)={0x0, @initdev, @empty}, &(0x7f00000091c0)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f000000a5c0)={0x0, @dev}, &(0x7f000000a600)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000aa40)={0x0}, &(0x7f000000aa80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000ab80)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f000000ac80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f000000b340)={&(0x7f000000acc0)={0x680, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x1bc, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x3f, 0x9, 0x4, 0x80000001}, {0x4, 0x4, 0x2, 0x6}, {0x35c5, 0x0, 0x6, 0x239cdf4c}, {0x6, 0x82f, 0x9, 0x7f}, {0x8f, 0x0, 0x10001}, {0x200, 0x5, 0x9, 0x3}, {0x400, 0x5, 0x2, 0x10000}, {0x2, 0x10001, 0x10001, 0x3}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r11}, {0x90, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r12}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x9, 0x368, 0x10001, 0x7}, {0x20, 0x4800000000000, 0x6, 0x4b}, {0x1, 0x7, 0x5, 0xdb8}]}}}]}}, {{0x8, 0x1, r13}, {0x124, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x1c0, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x9, 0x3c84}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xa55}}}]}}, {{0x8, 0x1, r19}, {0x4}}, {{0x8, 0x1, r20}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}]}, 0x680}, 0x1, 0x0, 0x0, 0x48000}, 0x48010) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000300)={0x10001, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @local}}}, 0x108) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1092.336616][T16716] Unknown ioctl 1074835115 16:29:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x0) [ 1092.375651][T16716] Unknown ioctl 1074820167 16:29:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x40, 0x2) r1 = dup(r0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f00000001c0)={0x2, "cf24fe27d32a8cfa4a45013abb5aa14e680053adc418f1f58d33af72b1904702", 0x1, 0x1}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x3, 0xcf}]}, 0xc, 0x2) 16:29:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1092.564592][T16926] EXT4-fs (sda1): re-mounted. Opts: 16:29:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f00000000c0), 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000300)={0x7, 0x1, {0x2, 0x2, 0x3f, 0x2, 0x6}}) open_by_handle_at(r0, &(0x7f0000000000)={0x7c, 0x200000000000000, "6f6d929513bf76cd4aa4ad77eb75ea5044b99031adaf25d7a0b7963dd5c336b19714bc5f774d82d88cfda69916b86382e2e495d64441879ca75d9d09ea5133a149ac71d17935d867dc06eb1fbe5a6ccbf23233fb0f732288aad700b9129d20ebaa9ef2faeda0fe4496c20a9167d01eaa48234163"}, 0x40) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:29:59 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f00000000c0)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:29:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40000, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 1092.643494][T16990] EXT4-fs (sda1): re-mounted. Opts: 16:29:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5452, &(0x7f0000000240)=""/174) 16:29:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:59 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0xfffffffffdfffffd) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/223, 0xdf) 16:29:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000040)=""/174) 16:29:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000080)=[{&(0x7f0000000300)="80b7ee061a481ad4deb755e02be7c3f2ec3845d33f403ad1e259cb471a4ebb58389e710eb9be506460a25b1f26e424884ba3ff7519e15a2c56c3ec6b985957000e20209dc6e1f8a791d88cf29147e38bac5a134656ff5486cc62a3c1f80958bdf9cd55a8ed78240a71019b8a7622100df843726f091d60284ce761add0dc1be3ebcebdcbf60b5286502b2f98080ed90fa2ec4d579d8fb738e4b072a31df79dc326720a2890d7d72031c62cdb70fc9577b55809d6a2dca0b3cdeeea2869662c03e797b499846c", 0xc6, 0x2}, {&(0x7f0000000540)="9f269bf103c8daf7f5aaa5e16d2a3da6cba13ab2203063781c0e4dde160793ad7ac2d9e4bba173583eb10384a5cc45edb24b3f2f1ebd0a5cf05639ba93432e81a304ff23eeca0d435ef17d5d6aa1986b31c6886caf51e0a5ffa40f79551ce2ccba9f9df4e3187334d8e4958860e78e827c9f56b7e3ba06b7ca927332473866eac311b5efb584067e35923dbf1b6ce56017bc357f04ba378232de20b6", 0x9c, 0x8}], 0x20000, &(0x7f0000000880)={[{@nodots='nodots'}, {@fat=@quiet='quiet'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@nodots='nodots'}, {@fat=@dmask={'dmask', 0x3d, 0x20}}, {@dots='dots'}, {@fat=@usefree='usefree'}, {@dots='dots'}], [{@obj_role={'obj_role', 0x3d, '@keyringvboxnet1GPL\x00'}}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x34}}, {@uid_eq={'uid', 0x3d, r1}}, {@euid_lt={'euid<', r2}}, {@smackfshat={'smackfshat'}}, {@obj_role={'obj_role', 0x3d, '/dev/ppp\x00'}}, {@uid_eq={'uid', 0x3d, r3}}]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x200400, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000980)={0x7}, 0x4) 16:29:59 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2800, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000100)={&(0x7f0000001740)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="000025bd7000fcdbdf250d000000040001002c000200080001000700000008000200f9ffffff080001000004000400040008000200040000001800020004000400080001003f00000008000100ff00000008000400040007002c000700080001000900da0f00000400060000000000000008000100080000000c0004007f00000000000000e40004002c00070008000300ff7f000008000200ffffff7f0800040000000000080003001600000008000300030000003400070008000200000000000800020000000000080003000500000008000400000000000800010019000000080001001c0000004400070008000100110000000800020001040000080002000400000008000100150000000800020005000000080001001a0000000800010005000008080001000f0000003c000700080002000300000008000400ff7f000008000300ff00000008000200020000000800030009000000080004000600000008000100190008000100ff0f00000800010041000000080001007f0000000800010001010000180006000800010000000100080001000200000004000200100007000c0003003f00000000000000e2a9da05d6de7eb0b452a3c693a824e784b853e4470a3b7b2a5a0e9848e9e5362c951bb68da9fe195326562c403961f94cfbbff39e718f60d6e27347182edb429da5612d89b866c36fd569620a5db8a75572becf7cd80800e6887a09c4f2078dac2136aa0a9fcc8e34fcda555605aabb376a25589c9cbf5ee688934a2598cdd3bfaa1ae246a1588b5f45cd01fb05ded34f13dc2e29068442fb6cc6616ec4d019c8c41f80e67a2cc5fafc2f485d0c319935341e38"], 0x1c8}, 0x1, 0x0, 0x0, 0x40000}, 0x10) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) lookup_dcookie(0x4, &(0x7f0000000180)=""/85, 0x55) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000740)=""/4096) 16:29:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x5, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:59 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) quotactl(0x928, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000003c0)="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") r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x638, 0x2) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000240)={0x0, 0x1, @stop_pts=0x4}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x9, 0x0, 0x0, 0x100023, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x1}, 0x8) 16:29:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5460, &(0x7f0000000240)=""/174) 16:29:59 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x100) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x434000, 0x0) write$binfmt_aout(r1, &(0x7f0000000540)={{0x0, 0x3ff, 0xffffffffffff5ef6, 0x51, 0x2ab, 0x8, 0x2a6, 0x7ff}, "79ae424efeaea7725a0bc52f3667a13e1de8084b8fc0bb79c4034d65f871adf669655fafc2e26781e4685df2e959751038afc2642519f2987df045beafddb88e346e06c0bbe00b2bab4adcd5fafc42bc8ea19bcdd041b7d5c5039fb1c2651792112b56e66d0aed860b4d7c5810344ffa3a9bab5414c6a53e648d4dee2c25767eab434fc5cdd44333b04c99fccdc72d6c7a9aa4d24275de0b0ce78c32905f04cccf2cf99d8294f393635e57becaf10541d8ff721b3a905218cf168d6f0e64c8e9f5ece7158b1ffd2328ae81a896b27e87ba91718b539620a3547d3c", [[], [], [], [], [], [], [], [], []]}, 0x9fb) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) recvfrom$ax25(r0, &(0x7f0000000140)=""/92, 0x5c, 0x2000, &(0x7f00000001c0)={{0x3, @null, 0x8}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) connect(r0, &(0x7f00000003c0)=@hci={0x1f, r2}, 0x80) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x5, 0x2, 0x9, 0x9238, 0x80, 0x7}) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x80) 16:29:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x655, @local, 0x9}}, 0x24) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000100)=0x9) 16:29:59 executing program 1: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000080)={0x3}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200400, 0x30) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x80000000) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:29:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:29:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ppp\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000a00)) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000ac0)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f00000007c0)=""/174) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000440)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000480)=0x10) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f00000004c0)=0x1000) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x2, 0x5}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000100)="70cb49eb05a6de3e55751ce9b59f7e73ded559bbb559d6af3c1c93ffd30b4a7f50a8ef7cb5288afea3406d32212dc74db91bb8cfb21802e0e347f2b52729b341a76b3df5c515fd25b1b59cb9f15421b25db6ca8412384f924f76dd4e5fb7b15aa02112dbe5deb23bc2c48edade7808fb70a30d87a5b095a4370beb908299bf65037a234b8542c6235acb64f278aaf9f1dff562f07d53c01c5bd19ce019b54f414fbcd998421117b0d01a1a3be8ad38764000807610d05b21d7ec817f6b80c450bc450c6a93a8", 0xc6}, {&(0x7f0000000300)="9d2321af01fd15a8f7005167b7201271485088c016d8d51bacee9db04ec02321bd0db0c6813bf86ed6cb813a78593ff86600827fe2790f035a48dd05046a560400a76c421a7cea599ef6d3699b7d0d30e8329ab4336be162c72084011835bab3a1f609f5a3023e272ea3b553ed17a8e610869d0544b02b0ec97d3d3b7d575186c7e9f9dcb798a91f9235c47121d0edb3a87c60566af61b1f6f5603da80856930d0901cad5f836d04994f7904", 0xac}, {&(0x7f0000000540)="1c0c863bf46863d16c541b4288fda9f0f8f9321d941827888a4962020111251aad6e29e70a948b672afd8c87899287274c530bbee1c5ba10e8a48c302044da8b96bc33f2764b7f02959cba4b3cb9c5bb1b275871438b89f107add0eb48188dbc4950310b47a17c37f72bc5b0d3a843c6880eb8945efa8fcfb947f6615d4ea67be16e7b539bf48cd01ded8211d187e337c15ad45449", 0x95}, {&(0x7f0000000200)="6a19d5448093f3c0e452a671ecec585d89808717bd8a1c39", 0x18}, {&(0x7f0000000600)="4a9ed0dc2efe9bc5b2b0afe8460ed89d247ffd9c5d153838e8eb85b3efd91e5527d6a101277ed4f080d3a274d21283873b23d27e0975687e3b6b4f5f2662cf9131ffd5ded4f0782a0c5db030c186c3cf6427f8ded316f31605a18ea90bd6893fa769bbb51ced2424cd5b8bde8d38ebae5a474759cef3c73e2718ff36d6d049271b3c2b46e91df5819fbfd824d69e2aa26a75931f5a31fb7f710fd3809d502597126a7e47f0a5a2235ffcd25efdc706b8da0a03f18c6b2af8562e0f3ce788ad42a9b540935c2c591b420394c49e9825efd24aad3bdf8c92", 0xd7}, {&(0x7f00000003c0)="75ff7795fca96300d46accd09e6492e22ca9ba2443d93fd50e0f8d5d768369ed807fa05e08745572ea01015489d2efcedd9c8e81210e986177a6f8daec39750070d209041c8963a5bbf50a33e1b9726045c4ab55d9a1d40950b10582c7b2f6843df978d2baf0ca55a0bdd7a86c3be7d6e85d90", 0x73}], 0x6}, 0x4000000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000a80)={0x10000000}) [ 1093.316353][T17717] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 5 (only 16 groups) 16:29:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743b, &(0x7f0000000240)=""/174) [ 1093.358045][T17730] EXT4-fs (sda1): re-mounted. Opts: [ 1093.390174][T17736] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 5 (only 16 groups) 16:30:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x40, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) 16:30:00 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x4000) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)={0xe, 0x7, 0x100000000, 0xc6c, 0x7a, "82781ce35b6d65f6dad860d2cab379724339febee046e58e0dec444d48ab50c21ce5c0e1fed32b7378f7023059b15ca2e18d6124f27e311e732dfdddddd10b40b447611239afb4a1ca67753eac11965a954939f48594ad3c6c0746bc0c0f6910b2211c644d37a32e61fc3a31bd84f31fdc1b4989fd6a9c80b43b"}, 0x86) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x4, 0x3f, 0x4}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={r2, 0x304}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) 16:30:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x10001d, 0x0) 16:30:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:00 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7c6, 0x400) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x20, 0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x145a, 0x8200, 0x7, 0x3a5d, 0x5, 0xee, 0x7, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r3, 0x6}, 0x8) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x100000001, 0x8600) write$binfmt_aout(r2, &(0x7f0000000540)={{0xcc, 0x8, 0xa5, 0x20, 0x381, 0x100000000, 0x21b, 0x80}, "6791d21dc73bdf5d391de52356e4140aa4a348dab0a5e978346945", [[], [], [], []]}, 0x43b) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000300)=ANY=[@ANYBLOB="fbffffff1400000006000000b700000060090000ff7f000007000000852bc5b3db58a07cf9615a3b940d5965b65fef1f038ad2d4fdeb52bbcadb599ef66f7da28ceae573aaa5afcb9957be21bcea6a41338390dbbe62c4773239c9fb894c4d52475c3d3a5cb13b4a8dd5b7a3fda1c9df6903f8a367c50c001bcdcfd3f11f0ac10cc31e80b022e26ffac3fe"]) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) 16:30:00 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8000, 0x40) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x2507fc, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x2b88) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x3, 0x1000}) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x81, 0x0) 16:30:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000240)=""/174) 16:30:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x8, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$EVIOCGREP(r2, 0x40047459, &(0x7f0000000300)=""/174) fcntl$dupfd(r0, 0x406, r0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200080, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000040)={{0x4, @addr=0x1000}, 0x8, 0x80000000, 0x4}) 16:30:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2, 0x0) 16:30:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0xfffffefffffffffb, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x100000001, 0x6, 0x0, 0x9, 0xfffffffeffffffff}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) 16:30:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047440, &(0x7f0000000240)=""/174) 16:30:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x10, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:00 executing program 0: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x34) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000240)=0x4) geteuid() 16:30:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x3, 0x5d7, 0x20, 0x8, 0x3, 0x3e, 0x4, 0x12c, 0x40, 0x78, 0x5, 0x6, 0x38, 0x1, 0xfffffffffffffffd, 0x1, 0x81}, [{0x1, 0x7, 0x3, 0xfffffffffffff001, 0x9, 0x6, 0x2, 0x7}], "7a65083c4b42926ed2b3db39e19f19a750a821aa58e68ed3ffc2764044790a70381ffb4a4a54c3964aedc47766141a37cbee028c15cf1ccaaaa3d73c24c4a8d5c67f8d8c8c3c586a63059376ed728884440440c556225c414655ab33dd5c781f01a3ec8b581bf72f1ab0d43419d8ae1f22663ca60902dca77d9176075b187546f0a230dfe1dd297823833ce57042bafd52132e059d7338f1189dd0e4e6459dd1ce92366a1dfbfb23140e69459bb40d2700f6a86ff4c4cd85c26fe18f265b08053d7254eb454f74099354cb34b07bcf12f049b816abef18e72c2e876474a0eb25dbaac63011632321cfd5a019c5a69d4e", [[], [], []]}, 0x468) 16:30:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x2004, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x1, 0x8, 0x21, 0x3, 0x3, 0x8, 0x28f, 0x40, 0x31a, 0x4, 0x8000, 0x38, 0x2, 0x9, 0x0, 0x1}, [{0x6474e557, 0x9, 0x20, 0xa5, 0x2, 0x269, 0x7f, 0x8}, {0x1, 0x6, 0xd008, 0x3, 0x6, 0x3, 0x2, 0x7}], "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", [[], []]}, 0x12b0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000300)=""/174) 16:30:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000000)=""/174) 16:30:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x48, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047452, &(0x7f0000000240)=""/174) 16:30:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x103000, 0x14) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'ip6gre0\x00'}}, 0xfffffffffffffff7) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000080)=""/135) 16:30:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000180)={0x7, 0x5, 0x68d}) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) fchdir(r2) dup2(r0, r2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x40) write$P9_RFLUSH(r1, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x8, {0x7}}, 0x18) 16:30:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4c, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) 16:30:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20800, 0x0) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x3, 0x1}}, 0xfffffffffffffec2) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:01 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="48000000000000070001000001000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="010000000000000000000000000000000000000000000000"], 0x48}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) mount$9p_unix(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1000008, &(0x7f0000000600)={'trans=unix,', {[{@cachetag={'cachetag'}}, {@access_client='access=client'}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@cache_mmap='cache=mmap'}], [{@dont_measure='dont_measure'}, {@euid_lt={'euid<', r3}}, {@euid_gt={'euid>', r4}}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r6}}, {@measure='measure'}]}}) r7 = open(&(0x7f00000023c0)='./file0\x00', 0x103000, 0x4) write$P9_RATTACH(r7, &(0x7f00000009c0)={0x14, 0x69, 0x2, {0x80, 0x0, 0x2}}, 0x14) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000002400)=0x7) mount$bpf(0x0, &(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)='bpf\x00', 0x8000, &(0x7f0000000900)={[{@mode={'mode', 0x3d, 0x100}}, {@mode={'mode', 0x3d, 0x1}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bind$bt_rfcomm(r7, &(0x7f0000000980)={0x1f, {0x9ed, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x1, 0x3ff, 0x9}, 0x1000}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept$ax25(r0, &(0x7f0000000a00)={{}, [@remote, @remote, @default, @rose, @rose, @default, @default, @default]}, &(0x7f0000000a80)=0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x5, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x0, 0x3, 0x6, 0x8, 0x5, 0xfffffffffffffffe, 0x4}, @alu={0x7, 0x7, 0xf, 0x3, 0x0, 0x100, 0x10}]}, &(0x7f0000000740)='GPL\x00', 0xff, 0x17, &(0x7f0000000780)=""/23, 0x40f00, 0x1, [], r5}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r8, 0x40106614, &(0x7f0000000840)={0x0, @speck128}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x60, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x28000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0x4, &(0x7f0000000100)=@raw=[@jmp={0x5, 0x6, 0xf, 0xb, 0x5, 0x6, 0x10}, @exit, @map={0x18, 0x6, 0x1, 0x0, r1}], &(0x7f0000000140)='GPL\x00', 0x100000000, 0xeb, &(0x7f0000000240)=""/235, 0x41f00, 0x1, [], r2, 0xa}, 0x48) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000080)={0x2, &(0x7f0000000400)=[{0x5, 0x80000001, 0x4}, {0x1, 0x848, 0x8, 0x2}]}) [ 1095.010383][T19439] 9pnet: p9_fd_create_unix (19439): problem connecting socket: ./file0/../file0: -111 16:30:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x1, 0x0, 0x0, 0x100020, 0x0) 16:30:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000040)=""/174) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x7fff, 0x2000) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000180)={0x30, "ff3e1fcced0973576420785904102149165724948ea8936fcc9977028a667c2e8ef734eaa7410dc4c4e73e3742b9c68650b60cf6c908ba0245caec86667f1bf12c801f7df25ef8aa9a6ecd7dbf7fa7e69c86122b811ecec76e84be324340fd5c7997f22d79d52db428890d00dc3744dff7fd3769fb8260d4692a2a50a938ec86"}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) 16:30:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40049409, &(0x7f0000000240)=""/174) 16:30:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x68, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:01 executing program 3: syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x0) 16:30:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40400, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f0000000100)=0x10) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f0000000240)=""/174) 16:30:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:30:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6c, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getmulticast={0x14}, 0x14}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}}], 0xfecd) 16:30:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000200)=&(0x7f0000000140)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) io_setup(0x1ed0, &(0x7f0000000000)=0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000580)={0x0, 0x5}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000600)={r4, 0xeabc, 0x1f, 0x5}, &(0x7f0000000640)=0x10) io_pgetevents(r3, 0x0, 0xa, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)={&(0x7f0000000080)={0x5}, 0x8}) 16:30:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000140)=0x8, 0x4) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00') syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:02 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:30:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x74, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000001540)=""/4096) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x8, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) 16:30:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getmulticast={0x14}, 0x14}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}}], 0xfecd) 16:30:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000ffd, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x72, 0x480300) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)={0x5, 0x4}) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000100)=""/250) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x50000, 0xa4) bind$rose(r1, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200002, 0x185) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000040)={0x5, 0xffffffffffffffff, 0xbc3, 0x400003, 0x949, 0x4}) 16:30:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7a, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:02 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 16:30:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x2a0e4b7a20770bef) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) read(r1, &(0x7f0000000000)=""/26, 0x1a) 16:30:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioperm(0x0, 0x9d8d, 0x0) 16:30:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f00000000c0)={0x2b}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, [], 0x1ff}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x20}], 0x2c) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/11) 16:30:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xc0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000240)=""/174) 16:30:03 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x4000000) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x800) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x0, 0x80020003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 16:30:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000001540)=""/4096, &(0x7f0000000040)=0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000540)=""/4096) 16:30:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4020940d, &(0x7f0000000240)=""/174) 16:30:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) shutdown(r0, 0x400000000000001) 16:30:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x80000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x8000}}], [{@pcr={'pcr', 0x3d, 0x2d}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selfposix_acl_access/]'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@fowner_gt={'fowner>', r1}}, {@measure='measure'}, {@fsname={'fsname', 0x3d, 'cpuset'}}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x2000, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x100, 0x0) bind$xdp(r2, &(0x7f00000003c0)={0x2c, 0x6, r0, 0x11, r3}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) lseek(r0, 0x0, 0x3) 16:30:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1096.954852][T21144] EXT4-fs: 13 callbacks suppressed [ 1096.954870][T21144] EXT4-fs (sda1): re-mounted. Opts: 16:30:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x280, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000340)={0x0, 0xfffffffffffffff7}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000400)={r1, 0x80000001}, &(0x7f0000000440)=0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000080)) ioctl$SIOCNRDECOBS(r0, 0x89e2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) 16:30:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x300, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x400000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x4, 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) bind$pptp(r1, &(0x7f0000000140)={0x18, 0x2, {0x0, @loopback}}, 0x1e) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000200)=0x3f) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000780)=""/174) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x3, 0x30444094, 0x1, 0x9, 0x42}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000540)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x58, 0x19b1227a, 0x258c, 0x0, 0xd48c}, &(0x7f00000000c0)=0x98) 16:30:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@remote={[], 0x0}, 0x2, 'team0\x00'}) 16:30:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000240)=""/174) 16:30:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) shutdown(r0, 0x400000000000001) [ 1097.288893][T21455] EXT4-fs (sda1): re-mounted. Opts: [ 1097.310428][T21502] overlayfs: missing 'lowerdir' 16:30:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4100, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000100)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x977806db590e6489, 0x6, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000000180)='./file0/file0\x00', 0xc51, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="06fdd6a895a906dac832dc2093a0ffa122f245d578c6bf6903e145a52f9313ca106bd96b34e6ae57", 0x28, 0x6}], 0xc0011, &(0x7f0000000240)={[{@disable_roll_forward='disable_roll_forward'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@usrjquota={'usrjquota', 0x3d, '/:'}}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@noinline_dentry='noinline_dentry'}, {@noheap='noheap'}, {@whint_mode_off='whint_mode=off'}], [{@subj_type={'subj_type', 0x3d, '/dev/dlm-control\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm-control\x00'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x500, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4000000000000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x12000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000540)=""/174) 16:30:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x0) syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x80) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x2, 0x400) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000140)={0x5, 0x5, 0x8000, 0x1, 'syz1\x00', 0xeb4}) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000000)=""/174) 16:30:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socket$kcm(0xa, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x4, 0x1000, 0x0, 0x274, 0x0, 0x1f, 0x40000, 0x8, 0x1, 0x438, 0x20, 0x8b4c, 0x3, 0x4, 0x7, 0x9df6, 0x7ff, 0x4, 0x0, 0x487, 0x6, 0x2, 0x1ff, 0x5e5, 0xf5e4, 0xfffffffffffffff9, 0x3ff, 0xa2, 0xffff, 0xff, 0x2, 0x81, 0x7f, 0x49f9, 0x401, 0x4, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x7, 0x8, 0x7a6, 0x52}, r2, 0x3, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000b40)=ANY=[], 0x0) 16:30:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) [ 1097.653574][T21817] EXT4-fs (sda1): re-mounted. Opts: 16:30:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x1000002000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x8, 0x2, 0x101) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000200)) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)="4c8763d00681736c2fc84d7f8cb9cc4fa5b501eb4f4e2ca98807bff84110e61e615b7cddf43be1a5e05e5e511afb4497ccf6f397b56a96e21daeb8dec21e77b0b2dac2eb083a343168ea1c7f261b9bd979d6b6db22a9212934eaa08cfef8eab5cfa402427355f04aa19c5ecb56f4a2380206f4c7d83abd4a638feddb7b80a243d78f467a516d7761cece654af1da5f1bd97a11a3791049e5b9955b9998", &(0x7f0000000300)="45fb1220858fb63b7add56253662086b7ab1a79c846c50c0cbdc6d4984dea0a4bbe204f6dc84accf2bbdb10a4253ab412e75ee60ade00617be9678014c1c47125e60e76efe7c50110d88f33eceb37833d4bdd9084a597c1bb3db12cb0a3526bcf98b287c90c8506f8c3610e963fdbb59b20fda7512d8ed6f4eac1f1012fa2313436e912c766a709cb15885f924f15b1f03e984e9d21f5d0636253c34596b55a7001e52be11c262f1d1090e939472a40d446785fccaa8119e934314ad5dec1e2f2c053d78b7", 0x3}, 0x20) 16:30:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x600, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x26) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x100021, 0x0) 16:30:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2380, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x700, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x1, 0xa000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000080)={0x8001009, 0x1f, 0x1}) prctl$PR_SET_FPEXC(0xc, 0x40000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000007c0)=0xc) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000100)="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", 0xfa}, {&(0x7f0000000200)="1244c8a1f80d9b56dca7cb2aae499254fe9c0ee2392eb305e25ad7e41eb06233cf44894e18a6c21f3bc2f2c61fe6b3005eeaad8604aeac80e38d003bd0877294133a24e26882f0dee6db8c94be797ebd10b3978b1fdfc34c01c4b3bda77fcf920c5430ba643df5f3a941a101495b383f3821900c84b1c88aaa8ce8e7aac84c4dc0a4837292106aa5a6fabb722e8e0b82acffaa28789afa87ad24ba4586705e38280ff7547d4f0b8327ed0d70a69578ce579de63f8452eb79b1fda56427b1d8d444f70b0b78594f682caa76c419511860bb41e8a1c821ee9aabd0e894beb378721a7c7460e5b78033eef34bd3674b636dc1", 0xf1}, {&(0x7f0000000300)="901201525f8807d51ee5561c3b697d3befe7f383e6a9dfd6645ef06791984d8bbc04f8d04591e6b01280261d098bd3a84cbac085a568f2e971fa73fbd1188112e9d0ca59457ff77f4e295d966226a2f94ea3900498", 0x55}, {&(0x7f00000003c0)="160f8c7fb5b077367217f576e0875393478695b2490a3432603bedb38970bfbbe192e838a3a8b89d5987417da2db7c27257a8131272f406b7b511e9cdf301edce4682a07bce49df0d74cdac16de17a68a013a6b2bd4f9e868d9c95c064c237900f3db3818cc2e1934acfd55adf53bea1ea7ccbb819bff204f444eb0c882d7287021dd360bb8c2fff76a15cfffc260400fe10f5e8304961affa83f2ea1a65f82f97bbc602fac83b7e1284cfedd0601377dcde5c869e39659df9939c954b1d23224429092fdabb227188cb30dd24a2e23d11c7ccfdc990", 0xd6}, {&(0x7f00000004c0)="df2d3f028272e7f8c53f6bd6160e5887a46de18c8668b55442485055d888efc8776f16b2ba628cbc96fe28df210f2c03b6f854245a33c31aa7009fc47d516f440e6ed21dabb201dddada944e57ed6d611441cf0e6055dd6b43c6", 0x5a}, {&(0x7f0000000540)="f7d0441ba77c4095a19c0dd97be01cd5b5441a27d20129df6cef6456fc3d41e0c60572c82ac09dfa7638e11fd1", 0x2d}, {&(0x7f0000000580)="dbbe6550e99785187fdf0fded0bfd6bd7c46d040c37e9c815407fd22bc03daaacc76b6bcce959871141c4f4e6b94043fffc110e14703f9b798328e0993a2e7db72d94af40b9f0fd4aa7e9ff6f4ef12f21db8cd1d", 0x54}, {&(0x7f0000000600)="ddd0ba0d55adb4238478e9efe40c4e93f1814bd41cfd4d26e5c79bcbd7335c889a67fb8e2a28883eb231f11e487ad90feb16319a713859e84a77f40f08d85bd5d75ad001b8af09c1322e1801cac9cf9eb990807213b239915c5cfe13f739defe043198220b0e923811090d733ddfb463045cc48203f8e41f210039272199e7380149c6d8df3e97d1fd40e1a00f75edfb3714f0c66b70dd06bece04e8ab2c6a7cdcb582fef1d6b1eeb817391c683e0a48f08dbebe77d11ac199863cfa5204720844d36171f71673688e5bd5cd11be655a19a97a817e54e3331a1647", 0xdb}], 0x8) 16:30:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8004745a, &(0x7f0000000240)=""/174) 16:30:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7fff, 0x20a000) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000600)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x2000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:04 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 16:30:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000540)={0xfffffffffffffffb, {{0x2, 0x4e21, @multicast1}}, 0x1, 0x2, [{{0x2, 0x4e24, @local}}, {{0x2, 0x4e20, @multicast1}}]}, 0x190) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4202, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000040)="5c3d8805cad8685467dd632c3273ba1d7a33863e7f9522587e8839c1496c2ef60306f63a279d597578e574873db70845997a7805a8dc6fb709ec534a123c929cf1fa4c4c252a971ebc9d516a0100e799a27f6b08d639ece35979bfd40d51184a108d7ef127c5665c10cea9fa3e2239e747c783985143f8f618bec8c105962b8e6a340e") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4004c1, 0x0) 16:30:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000240)=""/174) 16:30:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x119000) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3f00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1098.697614][T22835] EXT4-fs (sda1): re-mounted. Opts: 16:30:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'system.', 'user.syz\x00'}, &(0x7f00000000c0)=':#em1wlan0%/bdev\x00', 0x11, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x201) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) 16:30:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000440)='vegas\x00', 0x6) recvmsg(0xffffffffffffff9c, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/5, 0x5}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x2}, 0x2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000004c0)={{0xa, 0x4e21, 0x1, @mcast1, 0x7565}, {0xa, 0x4e21, 0x1f, @mcast1, 0x3b40000000}, 0x2, [0x80000001, 0x7ff, 0x7, 0x9, 0x7, 0x4, 0x1, 0x1]}, 0x5c) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000002540)={0xfffffffffffffffa, 0x107000}) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000480)={0x0, 0x0, {0x9, 0x6, 0xdb, 0x80000001}}) setsockopt$inet_tcp_buf(r3, 0x6, 0x0, &(0x7f0000001540)="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", 0x1000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000200)={0x0, {0x2, 0x9}}) [ 1098.779548][T23000] EXT4-fs (sda1): re-mounted. Opts: 16:30:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:30:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x4000, 0x1}) close(r0) 16:30:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x0) 16:30:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1099.054504][T23179] EXT4-fs (sda1): re-mounted. Opts: 16:30:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4800, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1099.131286][T23351] EXT4-fs (sda1): re-mounted. Opts: 16:30:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:30:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x1, 0x5, 0x4, 0x101}]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60800, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r2, 0x200, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20048000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) connect$pppoe(r1, &(0x7f0000000300)={0x18, 0x0, {0x2, @random="563781c3d344", 'team0\x00'}}, 0x1e) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x1}, 0x28, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1099.369704][T23480] EXT4-fs (sda1): re-mounted. Opts: 16:30:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4c00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1099.447219][T23653] EXT4-fs (sda1): re-mounted. Opts: 16:30:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="73656375726974792e2f6465762f7562695f6374726c0097093fa7a29e38ab3fb05bac025917eb21a5cd45c6505f773a88e12573988c756d907d124e3e2e3956a84c2114689fa07cddf3dbe7713f8b3f29fc7189079022c7d3d43b81f9d917f51f842ad0e71bbf2a6f9e26fa344479ac2080b04169ea85b9a4e05185253fdc95a680d5d1868ca35c8c5c1362d2bb10c00cb9ebf2066e0db0f1a8c96971bc4e99bcfda05cf9e8dbd06d8777478a53512dac677b8ccd4d0786c6c21b571872228990b6f0d7fec871b956b829f1c79e72eed222e0c4e138df36e338fc24ab5c14fec9f4bffe55f647c2db3891c8ad394d9b99283e"], &(0x7f0000000240)='\\+.\x00', 0x4, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0}, &(0x7f0000000a00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000300)="09401954d1807f5c43976baf007adc9904076866b27b2d111922fb32d70f028786531483ab38405589a741", 0x2b, 0xb1}, {&(0x7f00000004c0)="3a0f440855065f2bef18809644ef8cd6f11287cda4420c1c610378aba765381e671f6a0647da34992387785c293e9bfc4f67f87ff376576e61a3bf57fb8bc0932c22e9944ee7547fe049e7ec7ec63edefbba94e8fbf4e839f53d7be0fb9b68865facc04dff211895066c1897c61e8c3238cc86bd0d89b126c5f4d87a41de429d5341de9739a7b1e311b329bc9d3b3c150a75734d684937dc5f7859bbfac6c40c1091fbccbb2c1a4e783fdb7eea9910d48e0ae8fae07342b513d97a1959a928dcecca", 0xc2, 0x40}, {&(0x7f00000005c0)="767cc24e443af9ed22a8b304864aa45bc2135a7c3b67a5dea19be8cf1c42a1d93b38f67cf665ad78e3c86d1f5aa390f961b8f5edea06396be609d829f9c006f3caca4f5d8b02ea6bf10bae1e4b4c94e5c65d944e041179f4ad413cce1e6aa032b10150b15933d0be0a8325ce108194c6039c533b0d8556f71b47c64b92f05b7cd74d1a10eb63143ea9bebd867a7a158e61999f47ef2065a41aa2a0d53abe1a7c5776a21c3d57e63963a98b7d2bf8d9282957d2d878253e3b946dfe317a8f37b12713fddbe2fa4c2aba67a62e282a9b077be949a2b7a2d8c27bd42f0b523477eb7c448a7db4", 0xe5, 0x5}, {&(0x7f00000006c0)="433f3fdd4e6cbdbcf0986f42c731c4ac41dabf358e18229de8da41c04ac1ef1835fe6e9c331116ea8de19c0cac97164482b18b1743f11d45a0967cc2029bbacc9e9ed483193ae75cdf809cbc6560ea32f9bfd318e7a99490f23c657e208baefe5d9e0f276d8ed42c9f7f3228865c85d850f807c0ef0676e9208590d53745adecce98473937b96ab663d561e1d82d7e58a61f841b4d57b0d6e645c6ac80c388ef484613832cfc2ddc4afba81c93af1de97592faabd25026753801a833485caebc373d37c523bcafc1835dc2ed813edd25a0b270355167f3cf27df1ebe2e0ac56d931e4f8eac", 0xe5, 0x1f}], 0x8100a0, &(0x7f0000000ac0)={[], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, 'io'}}, {@subj_type={'subj_type', 0x3d, '/dev/ubi_ctrl\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'cpu'}}, {@uid_gt={'uid>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '%cgroup/'}}, {@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', r2}}, {@uid_eq={'uid', 0x3d, r3}}, {@measure='measure'}]}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)={[{0x2d, 'pids'}, {0x2d, 'cpu'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'io'}, {0x2d, 'cpu'}]}, 0x1e) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e24, @remote}}, 0x0, 0x4, 0x0, "eda17ce236d6ec558ac16ecefb2e7988de9502266da1b79e08202f947059ed0858102527a75ec4d086c5934fff15ead2bae00051c5af9fd02aff909b2f3f275b488a3a5cb6faf26a98990b1f72ae07e8"}, 0xd8) 16:30:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) 16:30:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r1, &(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, r2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r3 = accept4$rose(0xffffffffffffff9c, &(0x7f00000001c0)=@full={0xb, @remote, @netrom, 0x0, [@default, @null, @bcast, @bcast, @bcast, @netrom]}, &(0x7f0000000200)=0x40, 0x80000) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000300), &(0x7f0000000340)=0x10) 16:30:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x89d1, &(0x7f0000000080)=0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1099.708052][T23782] EXT4-fs (sda1): re-mounted. Opts: 16:30:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:30:06 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:06 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@generic={0xb, "9b2bf9b41253647edd32c2033ec95cc67c9c8456a8cb76ced2d2101aa8a1cfc2ef8107defd0e2644d89a91083408cb69ab9fd96220962bbac6b894a5ecbceaa9f492532bceb34a219ce426efb3db788981e135dde3e35fc1f9391f649af922af960cd31fd810226c56eaaafb69f5df5223c065340b07a062c16890e5b2d3"}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000300)="6c123f26d2cba2729518a6d1ef576164e8c6504e5d75d97f565c7962de810020863da2d16ec6f4c6b57a4ded7ea22b6ebf35828796f091378323b1a4b526af3a45b1562919bab00353f116d74b7286026c0541ed23372adb9deeadbdd8e967576e7c348bec404858f98f7fb90c63884fc94c0c7a6086c791d30593a51a9e623a927522b0baf2d3563e7e6c7ff967c4146f3a5f7d2f3459b589eb691a79904ced9e822db1cad6c3b673a15426248bf88ba82c5cbea64f50589641cc9e8645a698bea4f64eb57831b1a0a861f93b20f4f10e785f03849c64da281a8041d5b5d5ba535f7296a6d4f69e", 0xe8}, {&(0x7f00000000c0)="5b8a9d7e5710e0308a6cd771bd521f2a3a222408e6336ff45d3cd1d8199e", 0x1e}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="90a808ae398ab6d990891a56df7cc3a83da196872ee61428a263ce9180ee738eb2752ab802f3c35f1fe27214a0edca28c9ebdcaaa98d161da33ca7bf5f823244184fb39d466b27e774a2065e77f7ff5be1e0f5ac4e96e5d8b868731e660211e7e820864116b6e26ea749894db0cbb2ab392314392874f3ebadf3f91c5641009615409ed2eae1f3b627aa2bd80058f4", 0x8f}, {&(0x7f0000001600)="b47e52d30edd39c09943218179f59b05faa8d5bf0218993852d36e2a2464597a2814de297d11651db6e6531844447b6630beba7045208d556f4609f702d06ec8bea890f08497ac26f10739d32427db8040284218a1e9cc7bed58572c4a2bdfb2099a42b6f38e1083d71f335d204ce08c0a544df5fb3773374f9b8733218bf89c1332e5d47fcf5c0fce0c7d88c58692385468d8ee4baa0d89118945f1f078a0e3f588c5d2c0c0b27837d4733ec0aa98c92a57818a2f188f8ed59493d469ab1b0111064fb65d5bdeb34ef7e948eb0925abd6e116c90d17c47cd08edb8e7dbc4ab527f773d2427414", 0xe7}, {&(0x7f0000000140)="2d7d96bf9554d62b881a33b7b56d482240ec32c12282e1dfdd9dc78e601bb553bb85e592bd11c46433e7b673dfb9b3646537719d6759dccfea3a0f6a48bb72c7", 0x40}, {&(0x7f0000001700)="1c6a58d2eb98987caace416c8c60111a499bee0aefe8d1c96862bf015c515afe6ac6fd2040118aeab34923d041c1a9a56ac84f2aca6af0d81d16bfab4f5ac62577727bd8d004b38908d9cc6a3d729e86b17908024f9722405994b9a20320cce84ed10ffbf3c2e5c1ecbb246bb9359ab9fcd5a479815774325c2eb4c578d18eb21a5019c6481ecdb911b4dc607418a9f423a4a1fa03a27c20e56888206823fd63fa5324af4b90068fede4f9092d74adf128abbb3205c82af1af7b920e517d4f1d3032746d2aea37326256878ca92df8a560ab", 0xd2}], 0x7, &(0x7f0000001880)=[{0x1010, 0x11f, 0x9ba5, "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"}, {0x18, 0x0, 0x9, "1b6c929332"}, {0x88, 0x0, 0x100000001, "8e19b0f2440990d2148b5075eb7480c3d442e050be98ae77a96fd290a7e3fe78c47969af3dc2e74a6d6aa25bc3099ac63b83a0e316c44e741d524b1019d9e123c54a62ec6e5690b114c0a42c23db15ce438e6b5410e151ec0ded1ce04f24437e44b875b4c1fd01ee3d008df7351f3dc347d233e007d28c"}], 0x10b0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40047459, &(0x7f0000000240)=""/174) r2 = gettid() ioprio_get$pid(0x2, r2) 16:30:06 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x209ffe, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x17, 0xffffffff, 0x20}, {{r2, r3/1000+30000}, 0x1e, 0x4, 0x7fff}], 0x30) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='Bmd5sum\x00', r0}, 0x10) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) 16:30:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6800, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:06 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc020660b, &(0x7f0000000240)=""/174) 16:30:06 executing program 3: mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) 16:30:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000140)=""/174) 16:30:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6c00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/69, 0x45) 16:30:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e23, @multicast1}, {0x307, @broadcast}, 0x16, {0x2, 0x4e21, @broadcast}, 'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:06 executing program 3: mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) 16:30:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffe) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:07 executing program 3: mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) 16:30:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x1, 0x4) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x2) 16:30:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7400, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:07 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000009c0)) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@remote, @in=@multicast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@local}}}, &(0x7f0000001040)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x4000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40)='IPVS\x00') setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr=0x1100, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000000)=[@transaction={0x40406300, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=[0x48, 0x45c2fd6a264ae34a, 0x28, 0x38]}}], 0x0, 0x0, &(0x7f0000000300)}) 16:30:07 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x103, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1100.740338][T24849] binder_alloc: 24806: binder_alloc_buf, no vma [ 1100.762861][T24849] binder: 24806:24849 transaction failed 29189/-3, size 0-32 line 3056 16:30:07 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1100.809581][T24925] binder: BINDER_SET_CONTEXT_MGR already set [ 1100.826803][T24925] binder: 24806:24925 ioctl 40046207 0 returned -16 [ 1100.836458][T24849] binder_alloc: 24806: binder_alloc_buf, no vma [ 1100.843755][ T7765] binder: undelivered TRANSACTION_ERROR: 29189 16:30:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) accept4$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e, 0x800) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) fanotify_mark(r0, 0x80, 0x48000039, r0, &(0x7f0000000180)='./file0\x00') 16:30:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7a00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x81, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000400)=0x100000000, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x1000, @ipv4={[], [], @rand_addr=0xac}, 0x5}], 0x6c) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="edad2990", @ANYRES16=r3, @ANYBLOB="06022abd7000fbdbdf250a0000001c000100080001000a000000080006006c63000008000b0073697000080004000300000008000400b600000008000600080000001c00010008000b0073697000080002003b000000080002000000000008000400040000005800010014000300fe8000000000000000000000000000aa14000300ff02000000000000000000000000000114000300ff0100000000000000000000000000010800010002000000080004004e210000080004004e2300002c000200080003000300000008000300020000000800070005000000080003000000000008000400ffff0000"], 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) arch_prctl$ARCH_GET_CPUID(0x1011) [ 1100.861258][T24849] binder: 24806:24849 transaction failed 29189/-3, size 0-32 line 3056 [ 1100.900394][ T7765] binder: undelivered TRANSACTION_ERROR: 29189 16:30:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00'}) 16:30:07 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:07 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/27) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140), 0x0, 0x100}], 0x20000, &(0x7f00000001c0)={[{@logbufs={'logbufs', 0x3d, 0x6}}, {@prjquota='prjquota'}, {@wsync='wsync'}, {@noikeep='noikeep'}], [{@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '$'}}, {@smackfsroot={'smackfsroot'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x400, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x66}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000300)={r2, 0x80000, r0}) 16:30:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='9p\x00', 0x2004000, &(0x7f00000001c0)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, ']mime_typezeth1:'}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@noextend='noextend'}, {@mmap='mmap'}, {@access_client='access=client'}, {@fscache='fscache'}, {@cache_none='cache=none'}, {@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}]}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) 16:30:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xc000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:07 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/205, &(0x7f0000000040)=0xcd) 16:30:07 executing program 1: 16:30:07 executing program 1: 16:30:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x400, 0x4}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x7, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000180)="6185e37a0408c905942ebb4bbf7c8826821965e32d5db798b91969fa03a619ece77de3bdae0c98bcf18f2348cd8865ce2cecb36803f48cbd5a8a15e2b8cdb3a595784698cf4f008f69d438d7429ed13863574a20bf75a76c23a8f838115dedf6ac1a1e613dca68c77e50c0b016882e9a2271f9666e10a7a2312ad1df5535f4faefffb20e2b50c6cb837b89451b2957fc8de49e9e7172c72209a30ebb9c38d73dbd209dc99acfd2c3489ac119f1365fac111a7c345edf2fc47e49b8482bb11c46e309ac7b10fa2ae8") mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xedc0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:08 executing program 1: 16:30:08 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0xfffffffffffffffe, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x900) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) 16:30:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @loopback}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000002c0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x16e120, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="4e76e53cacaf78048d83407b0d01b0", 0xf, 0x800}], 0x10, &(0x7f00000004c0)={[{@gid={'gid', 0x3d, r0}}, {@session={'session', 0x3d, 0x80}}, {@session={'session', 0x3d, 0x81}}, {@barrier='barrier'}, {@part={'part', 0x3d, 0x1}}, {@decompose='decompose'}, {@force='force'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bdeveth0ppp0'}}, {@uid_gt={'uid>', r1}}, {@fowner_lt={'fowner<', r2}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, '(ppp1/'}}, {@subj_user={'subj_user', 0x3d, '['}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:08 executing program 1: 16:30:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:08 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000040)={0xed, &(0x7f0000000140)=""/237}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) fadvise64(r0, 0x0, 0x46, 0x2) [ 1101.854991][T25922] hfsplus: unable to parse mount options 16:30:08 executing program 1: 16:30:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1101.967275][T25945] EXT4-fs: 10 callbacks suppressed [ 1101.967302][T25945] EXT4-fs (sda1): re-mounted. Opts: 16:30:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x288000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0xd6e, 0x10}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={r3, 0x3}, &(0x7f00000003c0)=0x8) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000080)={0x0, 0x0, 0x400, &(0x7f0000000040)=0x9}) 16:30:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:08 executing program 1: [ 1102.068815][T25922] hfsplus: unable to parse mount options 16:30:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xff0f, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) set_robust_list(&(0x7f0000000100)={0x0, 0x7, &(0x7f0000000080)={&(0x7f0000000040)}}, 0x18) 16:30:08 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'batadv0\x00', 0x2}, 0x18) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)=""/21, &(0x7f0000000080)=0x15) 16:30:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:08 executing program 1: 16:30:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x8000) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x8000, 0x7, 0xfffffffffffffff9, 0x100}) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000300)=""/174) [ 1102.357689][T26442] EXT4-fs (sda1): re-mounted. Opts: 16:30:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x40000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) [ 1102.438342][T26518] EXT4-fs (sda1): re-mounted. Opts: 16:30:09 executing program 1: 16:30:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x190) mkdir(&(0x7f0000000040)='./file0\x00', 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:09 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000000c0)) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x4) 16:30:09 executing program 1: 16:30:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x80000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000700)=0x7) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x82) write$P9_RREADDIR(r1, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x8, [{{0x2, 0x1, 0x8}, 0x0, 0x80, 0x7, './file0'}]}}, 0x2a) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x5, r2}, {0x2, 0x1, r3}], {0x4, 0x5}, [{0x8, 0x3, r4}], {0x10, 0x7}, {0x20, 0x4}}, 0x3c, 0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x4, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000600)=""/246) ioctl$EVIOCGREP(r5, 0x40107447, &(0x7f0000000240)=""/174) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000440)) 16:30:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) 16:30:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x22) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0xfffffffffffffd1a, 0x0, 0x100020, 0x0) 16:30:09 executing program 1: 16:30:09 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) r1 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x1a18c0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @broadcast}, &(0x7f0000000480)=0xc) connect$packet(r1, &(0x7f00000004c0)={0x11, 0xfa, r2, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5c962e57daf1f4a3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0xb8, r4, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @local}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x800}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040}, 0x800) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) fcntl$setlease(r0, 0x400, 0x0) 16:30:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x100000000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x5, 0x82) accept$nfc_llcp(r1, &(0x7f0000000340), &(0x7f00000003c0)=0x60) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x2, 0x40) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @mcast2, 0x80000000}}}, 0x30) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@null=' \x00', 0x5, 'gre0\x00'}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000540)={{0x4, 0xfffffffffffffffa}, {0xddcd, 0xe5e}, 0xef8c, 0x1, 0x200}) getpid() 16:30:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) 16:30:09 executing program 1: 16:30:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x100000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:09 executing program 1: 16:30:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) 16:30:09 executing program 5: r0 = gettid() ptrace(0x4218, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) [ 1103.200812][T27282] EXT4-fs (sda1): re-mounted. Opts: 16:30:09 executing program 1: 16:30:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1103.281205][T27374] EXT4-fs (sda1): re-mounted. Opts: 16:30:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3ff7f8, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) 16:30:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x4d, 0x0, 0x10008, 0x0) r0 = socket$inet(0x2, 0x800, 0x8000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x100000001, 0x4) 16:30:09 executing program 1: 16:30:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8200, 0x0) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x15, 0x568, 0x4}], 0x18) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:10 executing program 1: 16:30:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) 16:30:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '!\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) 16:30:10 executing program 1: 16:30:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3ff800, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) 16:30:10 executing program 1: 16:30:10 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$P9_RMKNOD(r0, &(0x7f00000001c0)={0x14, 0x13, 0x2, {0x61, 0x0, 0x3}}, 0x14) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000300)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000200)={0x0, 0x3ff}) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000280)=0x1) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)={r3}) [ 1103.799128][T27857] EXT4-fs (sda1): re-mounted. Opts: 16:30:10 executing program 1: 16:30:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) [ 1103.891625][T27921] EXT4-fs (sda1): re-mounted. Opts: 16:30:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x5e68184fb5d762a) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x6, "18beeb8ed5906dce49cb31aeca61dc427d3b9cc6ee42b09ad155c88ed3d31c02", 0x3, 0x7b, 0x5, 0x1000000, 0x40000, 0xa}) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf0ffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1103.949247][T28033] QAT: Invalid ioctl 16:30:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="dd5eed75feb0e03f75b38d61ca3827a08ede49f59a47c80042073430546280bbe5ec74fb94a00e2d0c3329879271ab245689242337fb3de2cd57d045b0644cead8cd0566934158f211c405dfdb32bb50504a1468b6137e6a8401b2568976de131cff609d94a55f6b7c25d9fd0023de46b9352f6de6e9ef0001fb02a793fbeba4c09f8b6b42d98400a8d044b0eabfae0aac1de77a668819e581841a8690d99495adf6d0e1af7c098cd6dbc94062", 0xad, 0x7f}, {&(0x7f00000001c0)="b46027cd108edaae91eeb8688da9da09c36551d0a8291d10aee1cdac123cde56a5fdc3190a45dd00a0d221aade0329a9e81968082f1d379d0082c5b9fd1f870154cd0ff0c41a3ee03cef36aa28c45485150c9b5a6af437fac1a3b5f3d3ecc04d1b6d87aa71a633", 0x67, 0x6}, {&(0x7f0000000240)="0c42789a698b1f3fd59a7b570422fc07a0face3585c5713c3d9a0f5e6f882aaa3680f58c91b9f83a1da1e720c26b13e7942e21933ad9c0ee06ec57c561", 0x3d, 0x3}], 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB='notail,hash=tea,block-allocator=hashed_relocation,appraise,defcontext=unconfined_u,smackfshat=,fowner=', @ANYRESDEC=r0, @ANYBLOB=',subj_user=,smackfsdef=$\x00,uid=', @ANYRESDEC=r1, @ANYBLOB="2c81edf0e58fee3d69dd3b0ec80a411d00"]) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:10 executing program 1: 16:30:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) connect(r1, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80) 16:30:10 executing program 1: 16:30:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) 16:30:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf83f00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1104.218092][T28285] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "hash=tea" 16:30:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x800) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) prctl$PR_MCE_KILL_GET(0x22) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f00000004c0)={{0x3, @name="151c7378e5f9086d1f3815634bb46edef3b6dfa0c7df29391ed62b5ceac9b8a1"}, "24f52f12eacf17b672d4aa8966be03f7422f3b534461f89c80178abfe06a1a37", 0x3}) recvfrom$ax25(r1, &(0x7f0000000340)=""/246, 0xf6, 0x10100, &(0x7f0000000440)={{0x3, @bcast, 0x8}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null]}, 0x48) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000080)) 16:30:10 executing program 1: [ 1104.328437][T28378] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "hash=tea" 16:30:10 executing program 3: 16:30:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000003c0)={"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"}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x100020, 0x0) 16:30:11 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000000)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) capset(&(0x7f0000000080)={0x19980330, r1}, &(0x7f00000000c0)={0x5, 0x23eb802c, 0x100, 0x7fff, 0xff, 0x7ff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_pts(r2, 0x400000) 16:30:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x1000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:11 executing program 1: 16:30:11 executing program 3: 16:30:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCDISCONN(r0, 0x7439) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1104.634716][T28673] EXT4-fs (sda1): re-mounted. Opts: 16:30:11 executing program 1: 16:30:11 executing program 3: [ 1104.715736][T28921] EXT4-fs (sda1): re-mounted. Opts: 16:30:11 executing program 1: 16:30:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x2000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:11 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x802, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000000)=""/174) 16:30:11 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) 16:30:11 executing program 3: 16:30:11 executing program 1: [ 1104.944866][T28992] EXT4-fs (sda1): re-mounted. Opts: 16:30:11 executing program 3: 16:30:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0x6}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:11 executing program 1: 16:30:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:11 executing program 3: 16:30:11 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x820c0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0xb, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0xc0, "8c4332da3ffba7b78602208d10c4a4b947b012e1458f5b657e72ef6786b7b1df8818374c9029f6f5c82601228034cef2b80e86fcd6b76e0b4a5b6c433f7c77c112e071a432e8095c8abb3cfc825c0e2e2025ab4fc86b4567e3ea5c8319ac02f7b8eaa15c36849394fe1ce5a8fca33ad24944a5d9f999d54f42e27c2ac13c54d65f5ce3ce6987d035064eb7cb8dca7bb06a9e9772f31712a8840688b155085e27d57abacd3acfcbd02308c6ace843481005e714306c15baafba14ec001cdf8bf7"}, &(0x7f0000000080)=0xe4) getresuid(&(0x7f0000000400), &(0x7f0000000540)=0x0, &(0x7f0000000580)) quotactl(0x8000, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f00000005c0)="faeb20e18a7a56b0f30e93ed58f4e9b2f2ed3ec3202a1de71d274ba7cde2308cb2c4ecfd119e74628c2ce3f41f502628838046fbf6c58216cb5952f9b14547fa7b7b1f5e8a567babdad7ca3b3aa4d1a55249a8011be844c379cc8074d057741d808719a3cdbc") ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000f70000002193cf0c77e8a38a7f0731734bb014ae5c53e758997e1719817f78e2df151cd828e1c8656bec3da06af85fc8cd2d76de89c70ad2c5446de78c6742cba933dab8589c48aed22e7bfa31be8d95096fc0b8192b952b038bdad078242caf2eed78f12a23f44aa079eb8591f04aa11ccdcc3e00ef48989abc227dc87828b19c188da692e40a0b00006f873119194eed3ae0bf96bd7e87ff51e3d56f4fce60fb446172d9e66fbe00f4d1def2e61b0ce65087b14ec743d16254a696522d3d714203813700641851622721b1a9a4bd45db37f2f87e5b0e51f266f338dd5e65b63fc3d4c31b68260c77d37720000000000000000000000000000000"]) write$9p(r0, &(0x7f0000000640)="2eb89986fb4e7448c85ca7f5e125db5b97043416ad31bffca9f6a5de9ce556e1c295545a096b20fb40e78edcd65c936f91f277087593060ed078869a81f56e02f587e65a4457495932fde6b906bca6d35fe937ebdf9da399cea8a57e21465f171e1255895d4c93494cba63c575eadaf4af69362ddb9cebc8d362da3bfc9f21b4f3aeb8427d1620114802f7ae4d70badf5000f11926dfc2f0c22a51e8eeac3ae7255cdcaa578960c12aca36ec3429eda3dc718d4408ced1ef6413be687eab43470c6391db56c5094159d690eafc479caf22033c568dec4c", 0xd7) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000740)={'bridge_slave_1\x00', 0x2}) 16:30:11 executing program 1: 16:30:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:11 executing program 3: 16:30:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sysfs$2(0x2, 0x101, &(0x7f0000000140)=""/241) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xf3a, 0x202000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100)=0x5, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x3, 0x4) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x5d63, 0x9, 0x1, 0x5, 0x0, 0xd1c7, 0x4, 0x2, 0x7, 0x2, 0xa15, 0x8, 0x7f800000000, 0x6, 0x5, 0x2, 0x5, 0x2, 0x9, 0x2, 0x88, 0x5, 0x7f, 0x7fffffff, 0x9, 0x1, 0x101, 0xffffffffffffcce0, 0x6, 0x100, 0x1, 0x1, 0xfb, 0xf9e, 0x7, 0x7f, 0x0, 0x800, 0x0, @perf_config_ext={0x1f, 0x9cca}, 0x10, 0x80000001, 0xff, 0x1, 0x7fffffff, 0x4, 0x3}, 0xffffffffffffffff, 0x9, r0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)={0x2, 0x0, [0x0, 0x0]}) 16:30:11 executing program 1: 16:30:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x42200, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r2}, 0x10) vmsplice(r2, &(0x7f00000014c0)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="719aa7b1dd3af4e13f268ecad8e3df8986606367d5583ee625d978839a31a8ce330f6c9626e128e2611ea31ae9cd3489cda2de961b00918da5e3a33d01bc41c133238ef7fedf9f102456488e237256fbd7554a198219cc5a102ccb63fc3a7dc9efc773bacf0d1b47801a78134d618cd071a1b536277e01fbb1e0efe3b175570b4cc9fb32e4648f834315b178981564d87eec1f1f615022e34eec85468e9ff6360b040c86a7badd4e046841f5", 0xac}, {&(0x7f00000001c0)="e0057a06b6ac0347944d3f2a00855fdc66dfa94bf423e06d0f76b6ce7a37533eef369978c4e7d9302bc565afb79b6b9b320eb5af0b950ad0e93384355ec3728054b4d55f3d6acca47a3366a77e6eaf1931c8d3a8e8b694c5e679781a7a97458effb705a2552196a7bdee5f09d6f090638a895e5dddc561017e50", 0x7a}, {&(0x7f00000013c0)="ee1470024fc61e8fe96341b30fda253ea22aaffc54c5385b84afef335b8915464158a9dda171798fa0bf6679640714abe9152fdda17d1107a50ecd4a643c19f284754c05c66d21e9d9b5f4dbbb7018ffc68b6bd4bdbfe6f30a946c020eb758c8f1a4e0fe7bd71abfff35a4464f502810c3e4a1cbdf69f8cdfda33d1d6d37d9dfddf21b29af0821", 0x87}, {&(0x7f0000001480)="95", 0x1}], 0x5, 0xb) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r3) 16:30:12 executing program 3: 16:30:12 executing program 1: 16:30:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x5000, 0x100, &(0x7f0000000100)) 16:30:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20480) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x9, 0x3]) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) write$binfmt_elf32(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x5e0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x88000) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x7d, 0x800) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x79, 0x0) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000780)=""/174) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r3, 0xc008551c, &(0x7f0000000140)={0x8, 0x8, [0x0, 0x4]}) 16:30:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x5000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:12 executing program 1: 16:30:12 executing program 3: 16:30:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x9, 0x20080) ioctl$TIOCSBRK(r1, 0x5427) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80804000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff0000000000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x400, 0x4c53000000, 0x5, 0x1, 0x7}, 0x14) 16:30:12 executing program 3: 16:30:12 executing program 1: 16:30:12 executing program 3: 16:30:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x9) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x406240, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40400, 0x0) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @rand_addr=0x8}, 0x220, 0x0, 0x0, 0x0, 0x401, &(0x7f0000000140)='bond_slave_1\x00', 0xfff, 0x20, 0x1}) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v1={0x1000000, [{0x80, 0x1}]}, 0xc, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000300)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @rand_addr=0x7fff}, {0x2, 0x4e20, @empty}, 0x5c40300a30b96291, 0x0, 0x0, 0x0, 0x101, &(0x7f00000002c0)='veth0_to_hsr\x00', 0x100000000000, 0x1, 0x80000000}) 16:30:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:12 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in=@multicast2, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000000)=[@transaction={0x40406300, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600)=[0x28, 0x38]}}], 0x0, 0x0, &(0x7f0000000300)}) 16:30:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000080)) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000300)) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:12 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000000)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}}], 0x0, 0x0, 0x0}) 16:30:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1106.050924][T30170] binder: 30162:30170 transaction failed 29189/-22, size 0-16 line 2903 [ 1106.062199][T30168] binder_alloc: 30165: binder_alloc_buf, no vma [ 1106.068891][T30168] binder: 30165:30168 transaction failed 29189/-3, size 0-0 line 3056 [ 1106.096876][ T7765] binder: undelivered TRANSACTION_ERROR: 29189 16:30:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000140)={{0x3, 0x0, 0x6, 0x2, 0x8}, 0x1, 0x3f, 'id0\x00', 'timer1\x00', 0x0, 0x100000000, 0x9, 0x1}) 16:30:12 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) write$9p(r0, &(0x7f0000000240)="c9101c4cc83fcf283bbcf35d2b54989df33c35896233fa438379cfab7eaeec8ee9e9eaf67c406bb2852cf5763c7e85464bf466e1956b60cca6cc0b504baac5cbaf9286af74049a31af5edd68883f890f2f8a2328fd84d33671241bbf803e021d26158daca1a9ca6d8364403c7e0237d904befd82b9a0350127919ebf18ed44882f53d694aa7a54feb12f577cbdecd0df050fa66985b3f02690ba4003695f7d85d74e7fc0cf940ddbb77c23581010", 0xae) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x1, 0x601) semctl$SEM_STAT(r1, 0x7, 0x12, &(0x7f0000000100)=""/202) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x240000, 0x0) bind$pptp(r2, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1106.125862][T30223] binder: BINDER_SET_CONTEXT_MGR already set [ 1106.155749][T30223] binder: 30165:30223 ioctl 40046207 0 returned -16 [ 1106.194455][T30168] binder_alloc: 30165: binder_alloc_buf, no vma [ 1106.224745][ T7765] binder: undelivered TRANSACTION_ERROR: 29189 [ 1106.231497][T30168] binder: 30165:30168 transaction failed 29189/-3, size 0-0 line 3056 16:30:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8200, 0x100) getsockname$inet6(r1, &(0x7f0000000300), &(0x7f0000000340)=0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x9, 0x0, 0x8000, 0x0, 0xffffffffffffff5c}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)={r2, 0x6e, "b4e5c7e84c01234000a34d68f34f52ffcea9befcd52effed1978367283232f3b03f6bfdba64512d1058a27527a82eaeefe7f7d567834ae54da40085a416bb5c3fecdaae8144e498dc04e80fd7961a27fecf293cb5c9c51e8f452e01a265f5d83337072baa0f0e61c11d198e443b8"}, &(0x7f0000000200)=0x76) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1106.274658][ T7765] binder: undelivered TRANSACTION_ERROR: 29189 16:30:12 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 1106.338061][T30386] *** Guest State *** [ 1106.355146][T30386] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 1106.405099][T30386] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 1106.432759][T30386] CR3 = 0x0000000000000000 [ 1106.447791][T30386] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 16:30:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x1, 0x0, 0x9, 0x5, 0x100, 0x800}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 1106.466970][T30386] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 1106.475699][T30386] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 1106.494995][T30386] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 16:30:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x1, 0xfff, 0xffff, 0x4, 0x2}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1106.532670][T30386] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 16:30:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/44) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x5, 0x6, 0x10001, 0x4b01c065}, {0x6b52, 0x2, 0x3f, 0x10001}]}) 16:30:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x10000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1106.573725][T30386] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.607383][T30386] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.649981][T30386] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.691847][T30386] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.714110][T30386] GDTR: limit=0x00000000, base=0x0000000000000000 16:30:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:13 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0xfffffffffffffffe, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1106.784977][T30386] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.816074][T30386] IDTR: limit=0x00000000, base=0x0000000000000000 16:30:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@updsa={0x138, 0x1a, 0x9, 0x0, 0x0, {{@in6=@local, @in=@remote}, {@in=@dev, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'ghash-generic\x00'}}}]}, 0x138}}, 0x1000004) [ 1106.852127][T30386] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 1106.891080][T30386] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 1106.916620][T30386] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1106.949674][T30386] Interruptibility = 00000000 ActivityState = 00000000 [ 1106.971248][T30386] *** Host State *** [ 1106.980892][T30386] RIP = 0xffffffff811b3760 RSP = 0xffff88803496f8b8 [ 1106.990389][T30386] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1107.005812][T30386] FSBase=00007f4bb1872700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 1107.009571][T31120] EXT4-fs: 11 callbacks suppressed [ 1107.009581][T31120] EXT4-fs (sda1): re-mounted. Opts: [ 1107.033680][T30386] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 1107.051089][T30386] CR0=0000000080050033 CR3=000000008aeee000 CR4=00000000001426f0 [ 1107.074263][T30386] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 1107.082343][T30386] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1107.111044][T30386] *** Control State *** [ 1107.140725][T30386] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 1107.153161][T30386] EntryControls=0000d1ff ExitControls=002fefff [ 1107.173040][T30386] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1107.183385][T30386] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1107.198131][T30386] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1107.208423][T30386] reason=80000021 qualification=0000000000000000 [ 1107.220247][T30386] IDTVectoring: info=00000000 errcode=00000000 [ 1107.228910][T30386] TSC Offset = 0xfffffdadbe8fbd91 [ 1107.238828][T30386] EPT pointer = 0x00000000859fd01e 16:30:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20800, 0x0) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x3, 0x1}}, 0xfffffffffffffec2) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x7fffffff, 0x101801) r1 = open(&(0x7f0000000200)='./file0\x00', 0x1, 0x184) getpeername$llc(r1, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x2) getsockname$tipc(r2, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000540)=""/174) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x0, 0x4, 0xf58, 0xd04, "2f14eb0618030000000000af60c892ce157a0ce24eb79178f6cc10e9123e1472"}) 16:30:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x103800, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000000)=0x1) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:13 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) 16:30:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3f000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x40000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x111000, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x204040) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) dup3(r1, r3, 0x80000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$FUSE_IOCTL(r4, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x11df0590, 0x4, 0xffffffffffffff40, 0x6}}, 0x20) [ 1107.492068][T31251] EXT4-fs (sda1): re-mounted. Opts: 16:30:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x1) getsockname(r0, &(0x7f0000000100)=@rc, &(0x7f0000000080)=0x80) 16:30:14 executing program 1 (fault-call:1 fault-nth:0): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:14 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x48000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1107.676770][T31664] FAULT_INJECTION: forcing a failure. [ 1107.676770][T31664] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.727120][T31663] EXT4-fs (sda1): re-mounted. Opts: [ 1107.771947][T31664] CPU: 1 PID: 31664 Comm: syz-executor1 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1107.781109][T31664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.791171][T31664] Call Trace: [ 1107.794479][T31664] dump_stack+0x172/0x1f0 [ 1107.798831][T31664] should_fail.cold+0xa/0x15 [ 1107.803448][T31664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.809264][T31664] ? lock_downgrade+0x880/0x880 [ 1107.814126][T31664] ? ___might_sleep+0x163/0x280 [ 1107.818993][T31664] __should_failslab+0x121/0x190 [ 1107.823949][T31664] should_failslab+0x9/0x14 [ 1107.828466][T31664] kmem_cache_alloc+0x2be/0x710 [ 1107.833351][T31664] ? kasan_check_read+0x11/0x20 [ 1107.838233][T31664] vm_area_dup+0x21/0x170 [ 1107.842592][T31664] __split_vma+0xad/0x570 [ 1107.846972][T31664] ? find_vma+0x30/0x170 [ 1107.851230][T31664] __do_munmap+0x2ef/0xef0 [ 1107.855669][T31664] mmap_region+0x227/0x1770 [ 1107.860194][T31664] ? __x64_sys_brk+0x760/0x760 [ 1107.864967][T31664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.871210][T31664] ? get_unmapped_area+0x295/0x3b0 [ 1107.876337][T31664] do_mmap+0x8e2/0x1080 [ 1107.880528][T31664] vm_mmap_pgoff+0x1c5/0x230 [ 1107.885163][T31664] ? vma_is_stack_for_current+0xd0/0xd0 [ 1107.890714][T31664] ? ksys_dup3+0x3e0/0x3e0 [ 1107.895153][T31664] ksys_mmap_pgoff+0x4aa/0x630 [ 1107.899951][T31664] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 1107.905635][T31664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1107.911103][T31664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1107.916576][T31664] ? do_syscall_64+0x26/0x610 [ 1107.921353][T31664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.927433][T31664] __x64_sys_mmap+0xe9/0x1b0 [ 1107.927456][T31664] do_syscall_64+0x103/0x610 [ 1107.927479][T31664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.927492][T31664] RIP: 0033:0x457e39 [ 1107.927507][T31664] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1107.927522][T31664] RSP: 002b:00007f4bb1871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1107.966043][T31664] RAX: ffffffffffffffda RBX: 00007f4bb1871c90 RCX: 0000000000457e39 [ 1107.966053][T31664] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000020008000 [ 1107.966063][T31664] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 1107.966072][T31664] R10: 0000000000002011 R11: 0000000000000246 R12: 00007f4bb18726d4 [ 1107.966082][T31664] R13: 00000000004c3bb7 R14: 00000000004d6cc0 R15: 0000000000000004 [ 1107.982770][T31720] EXT4-fs (sda1): re-mounted. Opts: 16:30:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r1 = semget(0x2, 0x0, 0x0) semctl$SETVAL(r1, 0x1, 0x10, &(0x7f0000000100)=0xfffffffffffff800) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x84540, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f00000001c0)={0x22, 0x26, 0x2, 0x3, 0xa, 0x4, 0x4, 0x2a, 0xffffffffffffffff}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x8) write$UHID_INPUT(r3, &(0x7f0000000540)={0x8, "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", 0x1000}, 0x1006) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xac0, 0x2) ioctl$EVIOCGREP(r3, 0x40107447, &(0x7f0000000240)=""/174) prctl$PR_SVE_GET_VL(0x33, 0x176a7) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000080)=0xfffffffffffffff7) ioctl$VIDIOC_SUBDEV_S_FMT(r3, 0xc0585605, &(0x7f0000000300)={0x1, 0x0, {0x8000, 0x3, 0x301c, 0x7, 0xc, 0x6, 0x0, 0x6}}) 16:30:14 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x101100) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x41ee, 0x1, 0x316, 0x0, 0x1ff, 0x20e, 0x4, 0x7, 0x7fffffff, 0x2, 0x2, 0x4, 0x1, 0x1ff, 0x7, 0xfff, 0x101, 0x1, 0x7ff, 0x5, 0x1fffe000, 0x8d4, 0x0, 0x10001, 0x400, 0x80000001, 0x10000, 0x8, 0x5, 0xffffffffffffb4d1, 0x6, 0x95f, 0x7, 0x3, 0x4, 0x0, 0x0, 0x2, @perf_config_ext={0x1}, 0x1002, 0x8, 0x6, 0x7, 0x1000, 0x6, 0x5bef}, r1, 0x2, r0, 0x8) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000240)=""/174) [ 1108.031766][T31721] EXT4-fs (sda1): re-mounted. Opts: 16:30:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x8, 0xe, 0x8001) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000340)={0x0, 0xffffffffffff4503, 0x1}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4c000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 1108.309353][T32180] EXT4-fs (sda1): re-mounted. Opts: 16:30:14 executing program 1 (fault-call:1 fault-nth:1): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:14 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x3, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="9e000000b40ce761b2a874d5eb1c8dcaf4d9b53d73481bda40fc7445d1c492568717f07a7eba8b69c57e2a37d97b54117d1178172c35a6818129f75ce87aa68a3be5f5f32a6c8bb0fa3ad4776ccffbca702dd2bb77c1ef30fea37735ad6a759a3bb8a30cecea3a7525b4226702601869640a052532b3a2d45c635ec3aa119ce9829b1785580ffb6b10715f6b6cd3f62cc231"], &(0x7f0000000080)=0xa6) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x400}, &(0x7f0000000200)=0x8) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000300)={0x5, {0x10001, 0x9, 0x5, 0xbf7f, 0x1, 0x1}}) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') fcntl$dupfd(r0, 0x406, r0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='pagemap\x00') ioctl$EVIOCGREP(r3, 0x40047451, &(0x7f0000000240)=""/174) [ 1108.355672][T32285] overlayfs: filesystem on './file0' not supported as upperdir 16:30:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x60000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x20, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000100)="1a9a31e735d041a7cb109136fccdf000168b9b2d33c5fbcac6e7ddf81bf8f2c3b02599e32ba4625f4ad35c3f90f93208681fe891bd8a1c6263a58a0bd6b3009cf08fbc4cc9475df354eff3e3b02fcd448dceb8") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x4840, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) r3 = socket(0x40000000015, 0x5, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000007c0)=0x2, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000013c0)=@nat={'nat\x00', 0x1b, 0x5, 0x5b0, 0x180, 0x380, 0x0, 0x380, 0x180, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x5, &(0x7f0000000400), {[{{@ipv6={@mcast1, @mcast2, [0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xffffffff], 'veth0\x00', 'hsr0\x00', {}, {}, 0x3b, 0x9, 0x1, 0xb}, 0x0, 0x140, 0x180, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x6, 0x6, 0x1, [0x800, 0x1ff, 0xc90, 0x1000, 0xb2f, 0x1, 0x1, 0x0, 0x0, 0x2, 0x3, 0xffff, 0x3, 0x7ff, 0x2, 0x2], 0x3}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x3, 0x5, 0x3, 0x0, 0x2}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "484850b72a539fd35af78d78f57907a0556436dbbc5170466872f50ce374"}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, [0xff000000, 0xff000000, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffff00, 0xff], 'veth1_to_bond\x00', 'veth0_to_bond\x00', {}, {}, 0x1d, 0x8, 0x2, 0x20}, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv4=@remote, @ipv6=@local, @icmp_id=0x64, @port=0x4e24}}}, {{@ipv6={@remote, @ipv4={[], [], @loopback}, [0x0, 0xff, 0xffffffff, 0xffffffff], [0xffffffff, 0x0, 0xffffffff, 0xffffff00], 'team_slave_1\x00', 'batadv0\x00', {0xff}, {0xff}, 0x37, 0x4, 0x2, 0x1e}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x7, 0x800, 0xdae}, {0x0, 0x80, 0x3a20}}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x5, 0x0, [0x7ff, 0x10001, 0x7, 0x1, 0xffffffffffff8000, 0x1, 0x9, 0xb0, 0x2, 0xfffffffffffffff7, 0x7, 0xffffffff, 0x6, 0x2, 0x6, 0x80000000], 0x3}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x3, 0x0, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80202, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000e40)="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", 0x481, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f00004b3fff), 0x0, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004440)=[{{&(0x7f0000003c80)=@l2, 0x80, &(0x7f0000004380)}}], 0x1, 0x0, &(0x7f0000000000)={0x0, 0x989680}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="04b90000008bede400000010d85820d0d1452d5300100000c20b58994d9205e60000e8da1059acb3b9538401e56e123b89dd1e097ee8f83f8c8fc07b"]) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x100000001}}, 0x800, 0x3, 0x8001, 0x7, 0x8}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000003c0)=r4, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x295f}}, 0x18) 16:30:15 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x8}, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x3, 0x0, "07b0b53d4f928164679597ed543d669cf56bdf33167e22bb5848a88bb142fe7bdf9c5f2927f53bc09fabd5edf88bc205c420c62b7267ae5b73aa516345da0b1f945b62fdb390301f90ac448bfb5f5789"}, 0xd8) 16:30:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x68000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:15 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:15 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000140)={r2, 0x3}) readahead(r0, 0x3, 0x4) 16:30:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6c000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x90c00, 0x0) fstat(r0, &(0x7f0000000100)) 16:30:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x2, 0x1, 0x2011, r0, 0x0) 16:30:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) pwrite64(r0, &(0x7f0000000000)="c6035ae1bd55131529d5713322e57a950d8166225872e6953cc5230143003d96661bc9c5b3db6cd7022373040fe5d3fecf7198525d0419994768090680c22843740405bb0d0de298812daa9794", 0x4d, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x10) 16:30:16 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x80000) r1 = syz_open_dev$amidi(&(0x7f0000000400)='/dev/amidi#\x00', 0x9, 0x2000) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f00000006c0)=""/174) fstatfs(r0, &(0x7f0000000000)=""/169) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000140)={0x80, 0x4}) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000180)={0x101, 0x4, 0x81, 0x762, 0x3, 0x40, 0x100000000, 0x7f, 0x5, 0x1}) 16:30:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x74000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1109.621451][ T714] EXT4-fs (sda1): re-mounted. Opts: 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1004, 0x1, 0x2011, r0, 0x0) [ 1109.686083][ T849] EXT4-fs (sda1): re-mounted. Opts: 16:30:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7a000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) sendmsg$nl_netfilter(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x6, 0xf, 0x38, 0x70bd29, 0x25dfdbff, {0x7, 0x0, 0x6}, [@typed={0x8, 0x6e, @ipv4=@multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4008000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x2000) open$dir(&(0x7f0000000080)='./file0\x00', 0x20001, 0x100) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0xffff, 0x9) 16:30:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0) 16:30:16 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = gettid() r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x44000, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3, 0xff, 0x7f, 0x1, 0x0, 0x305, 0x20, 0x3, 0xfff, 0x5, 0x1, 0x9, 0x0, 0x424c, 0x6de, 0xfffffffffffffe00, 0xfffffffffffff737, 0x9, 0x8, 0x6, 0x5a, 0xa, 0x7fffffff, 0x80, 0x8000, 0x98, 0x40, 0xefc, 0x6, 0x5, 0x5, 0x6cb3, 0xffffffffffffff7f, 0x1, 0x1000, 0x1000, 0x0, 0x34855acb, 0x7, @perf_config_ext={0x4, 0xa7}, 0x220, 0x7, 0x9, 0x1, 0x8, 0x9, 0xdb92}, r1, 0x10, r2, 0x0) 16:30:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x8cffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x20008000, 0x1, 0x2011, r0, 0x0) 16:30:16 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x18440, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) 16:30:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000140)=""/174) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xb18, 0x0) 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x7fffdfff7000, 0x1, 0x2011, r0, 0x0) 16:30:16 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xc0000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x220040, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f00000000c0)=""/174) 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x7ffffffff000, 0x1, 0x2011, r0, 0x0) 16:30:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setown(r0, 0x8, r1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x2, 0x2011, r0, 0x0) 16:30:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xc0ed0000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x1, 0x0, 0x80000001, 0x1, 0x5c}) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_settime(0x1, &(0x7f00000000c0)={r2, r3+10000000}) 16:30:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xfffffffffffffc64, 0x10000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x7fff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e20, @multicast2}}, 0xe1, 0x1}, 0x90) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000280)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000002c0)={r2, 0x11}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000003c0)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000008000000000000000000000000006f0000000000000000000000000000000000100000000000000000000000000000000000040000000000000000000000000000000000"], 0xb8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000080)={0x7fffffff, 0x5, 0x8, @dev={[], 0x1e}, 'veth0_to_hsr\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x2011, r0, 0x0) 16:30:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1000, 0x111000) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000001c0)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000200)=0x400) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000100)="d27c08965dfaeea4d656c406c7b1afa7469fde2aa4f96d702e157b2c4f35b869c6115338c02e6ab72f3ff381f9fc3e59dfae94e7418abc52ad95a97d1b730bfb8375441c41d7f2ecac4009578dca4cab64ee00758844f042cde9d951a89aa5f26c1339ccbb7cd82e9de114a6914314cae596fef5416effbfd48c254528d172e09f2f2e47234714da1453b834f9f269b9be3918a5d7df1f67368e888e2947d5d419173c1d5d52fe7494ac") 16:30:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/rt_cache\x00') r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x20000) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000300)=""/174) read$eventfd(r1, &(0x7f0000000000), 0x8) 16:30:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf5ffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x4, 0x2011, r0, 0x0) 16:30:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x0) 16:30:17 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x400, 0x80180) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xbf, 0x20000) pipe(&(0x7f0000000080)) pipe(&(0x7f00000000c0)) open(&(0x7f0000000200)='./file0\x00', 0x80, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x800, 0x80000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rfkill\x00', 0x101600, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vcs\x00', 0x4000, 0x0) syz_open_dev$cec(&(0x7f0000000b00)='/dev/cec#\x00', 0x1, 0x2) syz_open_dev$adsp(&(0x7f0000000b40)='/dev/adsp#\x00', 0x101, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/null\x00', 0x4d0000, 0x0) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000d40)=""/174) [ 1110.780485][ T2118] EXT4-fs (sda1): re-mounted. Opts: [ 1110.888941][ T2148] EXT4-fs (sda1): re-mounted. Opts: 16:30:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x0) 16:30:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf6ffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x6, 0x2011, r0, 0x0) 16:30:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x22, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xa6, 0x0) dup(r0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x0, @bcast, @rose={'rose', 0x0}, 0x100, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x5, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000040)=""/89) 16:30:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, 0x0, 0x0, 0x0) 16:30:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380), 0x0, 0x0) 16:30:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x8, 0x2011, r0, 0x0) 16:30:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf8f73f00, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:17 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x110, r0, 0x0) 16:30:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/21, 0x15}], 0x1}, 0x3}, {{&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x2, &(0x7f00000013c0)=""/235, 0xeb}, 0x9}, {{&(0x7f00000014c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001540)=""/104, 0x68}, {&(0x7f00000015c0)=""/210, 0xd2}], 0x2, &(0x7f0000001700)=""/183, 0xb7}, 0x1}, {{&(0x7f00000017c0)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/93, 0x5d}, {&(0x7f00000018c0)=""/99, 0x63}], 0x2, &(0x7f0000001980)=""/244, 0xf4}, 0x80000001}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000001a80)=""/73, 0x49}, {&(0x7f0000001b00)=""/123, 0x7b}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000002b80)=""/79, 0x4f}, {&(0x7f0000002c00)=""/153, 0x99}], 0x5, &(0x7f0000002d40)=""/254, 0xfe}, 0x7}, {{&(0x7f0000002e40)=@nl=@unspec, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)=""/135, 0x87}, 0x1}], 0x6, 0x0, &(0x7f0000003140)={0x77359400}) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 16:30:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x200}}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000240)=""/174) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) 16:30:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380), 0x0, 0x0) 16:30:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xff0f0000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x102, 0x2011, r0, 0x0) 16:30:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380), 0x0, 0x0) 16:30:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2040, 0x0) 16:30:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x10200) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x6) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xfffff000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0) 16:30:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x300, 0x2011, r0, 0x0) 16:30:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0) [ 1112.040263][ T2667] EXT4-fs: 1 callbacks suppressed [ 1112.040275][ T2667] EXT4-fs (sda1): re-mounted. Opts: 16:30:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) setsockopt$sock_int(r0, 0x1, 0x17, &(0x7f0000000080)=0x3, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xffffff8c, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x140) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0xf18, &(0x7f0000000040)=0x0) io_getevents(r2, 0x50, 0x3, &(0x7f0000000080)=[{}, {}, {}], 0x0) 16:30:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x2000, 0x2011, r0, 0x0) 16:30:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0) 16:30:18 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x4000, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x220940) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x3, 0x20, 0x20, 0x5, 0x0, 0x10001, 0x0, 0x8, 0xd7, 0xfff, 0xffff, 0x2, 0x1f, 0x10000, 0x7, 0x0, 0x5, 0x4, 0x80000001, 0x100000001, 0x400, 0xe0a3, 0x101, 0x401, 0xfffffffffffff0f7, 0x55a4, 0x2, 0x2, 0x3, 0x1b84, 0x5, 0xfffffffffffffffa, 0x9, 0x4, 0x6, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0x80000000}, 0x308, 0x5, 0x80, 0xe, 0x0, 0x86, 0x40}, r1, 0x10, r2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000004c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000300)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @remote}, {0x2, 0x4e21, @remote}, 0x2, 0x0, 0x0, 0x0, 0xf6f, &(0x7f00000001c0)='ifb0\x00', 0x8, 0x39, 0x5}) sendmsg$inet_sctp(r1, &(0x7f0000002ac0)={&(0x7f0000000500)=@in6={0xa, 0x4e24, 0x80000001, @local, 0x3ff}, 0x1c, &(0x7f0000002a40)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="19fc75406c4d1b7fe7146bb65b3db117c09b81d89b0ed7e1fb909b67a54d82d613fd2204b9d1969e9d7dd50a0e59fb09750bc3c57d832ed5b640e054da", 0x3d}, {&(0x7f0000001840)="2eb017ccc5f94451a0fcbc16277ef3842fb6a8db17f92f476d7897f24857d50eb949d667cab57b9a498cadcb08bc8ea0d2406bcc8a80116d2dd2590670dfda0cc4ebedba486992a5ab0e7a54824c7c0ae8b0e9ed2fc38735168b2517bc076752f771572237c45a85858316010d80d163cd4526aa331de8b90c9bf7329685731ca3fa3bef894ff9ba1e12eed64fe8f74935adc865fcbb446b603625daa022f57cd350bea184b9f47b2a6ef4", 0xab}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000002900)="fe70a21aff3305243a555dd0ccd5a48d17e7e274ed1fc30f10a6a3f9bc13c36ffbab2156d0cc49183a2a62bf9b2bed9f57", 0x31}, {&(0x7f0000002940)="d3463e086de0c677d4fd94148163fcc88837ca400abdcd37bfd1ef18765f393af8cdfd89ea26f192da02e8ee6301618e89cdd729aa21f30fa06991d681d7dafc18a641fd1b1c36a5ae0aea58e74238b9af0381636d3fbd482e4e0ad4f0763ebc39bb177e10078e973176af4cc3381a369ec9ae2150c6eeb21e463fb6bf6124c8e769e7b5d302fdf3ef06337d66cc365314489290263f2f7c824a1415b3e54571b2c243261afc53008a04a51e6c90ce95b512d2dbd30cfe4f5ba90e7494afb4d896564ac53d8b2ab20fc0c3e915bd970b920de1d2d5d61f3e1654fcbe1fa3577a7d71b19550", 0xe5}], 0x6, 0x0, 0x0, 0x4080}, 0x1) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000440)=""/88) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='/dev/ppp\x00') ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000003c0)=0x4) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000200)=""/31) ioctl$EVIOCGREP(r3, 0x40107447, &(0x7f0000000640)=""/174) write$cgroup_int(r2, &(0x7f0000000380)=0x4, 0x12) setsockopt$inet6_tcp_int(r2, 0x6, 0x1f, &(0x7f0000000180)=0x9, 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f0000000700)={0x80000000, 0x0, "e8269eff0e0a49b9c90563c715be2091512d72d80c89e8503a719cf5bfa657ea", 0x20, 0x8000, 0x8, 0x7fffffff, 0x6, 0x6, 0xbc, 0x4, [0xffffffff, 0x7, 0x7fffffff, 0x6e]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x81, 0x3, 0x8000, 0x1, 0x8, 0x6, 0x9, 0x1, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={r5, 0xffff}, 0x8) 16:30:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x90c00, 0x0) fstat(r0, &(0x7f0000000100)) 16:30:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xfffffff5, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1112.292127][ T3620] EXT4-fs (sda1): re-mounted. Opts: 16:30:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x4) 16:30:18 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={[], 0x2}}, 0x12) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) [ 1112.391807][ T3783] EXT4-fs (sda1): re-mounted. Opts: 16:30:18 executing program 2: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000000)=0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1112.422246][ T3802] EXT4-fs (sda1): re-mounted. Opts: 16:30:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xfffffff6, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:19 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x184, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5f1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xbc0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffff}}}}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x20000880}, 0x4000) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000003c0)) 16:30:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x2000) 16:30:19 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xedc000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1112.670844][ T4207] FAULT_INJECTION: forcing a failure. [ 1112.670844][ T4207] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.735089][ T4207] CPU: 0 PID: 4207 Comm: syz-executor3 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1112.739475][ T4224] EXT4-fs (sda1): re-mounted. Opts: [ 1112.744037][ T4207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.744054][ T4207] Call Trace: [ 1112.744081][ T4207] dump_stack+0x172/0x1f0 [ 1112.744110][ T4207] should_fail.cold+0xa/0x15 [ 1112.744139][ T4207] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.744159][ T4207] ? lock_downgrade+0x880/0x880 [ 1112.744184][ T4207] ? ___might_sleep+0x163/0x280 [ 1112.787144][ T4207] __should_failslab+0x121/0x190 [ 1112.792093][ T4207] should_failslab+0x9/0x14 [ 1112.796605][ T4207] kmem_cache_alloc_node_trace+0x270/0x720 [ 1112.802424][ T4207] ? __might_fault+0x12b/0x1e0 [ 1112.807223][ T4207] __kmalloc_node+0x3d/0x70 [ 1112.811768][ T4207] kvmalloc_node+0x68/0x100 [ 1112.816281][ T4207] ? seq_dentry+0x2d0/0x2d0 [ 1112.820784][ T4207] seq_read+0x832/0x1130 [ 1112.825043][ T4207] ? seq_dentry+0x2d0/0x2d0 [ 1112.829548][ T4207] proc_reg_read+0x1fe/0x2c0 [ 1112.834146][ T4207] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1112.839645][ T4207] ? rw_verify_area+0x118/0x360 [ 1112.844509][ T4207] do_iter_read+0x4a9/0x660 [ 1112.849019][ T4207] ? dup_iter+0x260/0x260 [ 1112.853364][ T4207] vfs_readv+0xf0/0x160 [ 1112.857529][ T4207] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1112.863599][ T4207] ? kasan_check_read+0x11/0x20 [ 1112.868470][ T4207] ? __fget+0x367/0x540 [ 1112.872648][ T4207] ? ksys_dup3+0x3e0/0x3e0 [ 1112.877087][ T4207] ? check_preemption_disabled+0x48/0x290 [ 1112.882810][ T4207] ? wait_for_completion+0x440/0x440 [ 1112.888106][ T4207] ? __fget_light+0x1a9/0x230 [ 1112.892810][ T4207] do_preadv+0x1c4/0x280 [ 1112.897061][ T4207] ? do_readv+0x290/0x290 [ 1112.901392][ T4207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1112.906864][ T4207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1112.912325][ T4207] ? do_syscall_64+0x26/0x610 [ 1112.917026][ T4207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1112.923107][ T4207] ? do_syscall_64+0x26/0x610 [ 1112.927820][ T4207] __x64_sys_preadv+0x9a/0xf0 [ 1112.932508][ T4207] do_syscall_64+0x103/0x610 [ 1112.937107][ T4207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1112.942995][ T4207] RIP: 0033:0x457e39 [ 1112.946921][ T4207] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.966525][ T4207] RSP: 002b:00007f9755406c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1112.974930][ T4207] RAX: ffffffffffffffda RBX: 00007f9755406c90 RCX: 0000000000457e39 16:30:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x1000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x3f00) 16:30:19 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2040, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000001c0)=0x7ff, 0x4) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f00000000c0)=""/174) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20080, 0x0) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x11, 0x800) ioperm(0x5, 0x5, 0x81) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=0x0, &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r3, 0x4}, &(0x7f00000002c0)=0x8) 16:30:19 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1112.982911][ T4207] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 1112.990892][ T4207] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1112.998876][ T4207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f97554076d4 [ 1113.006848][ T4207] R13: 00000000004c4962 R14: 00000000004d8190 R15: 0000000000000004 16:30:19 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000040)=""/26) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000540)={{0x8, 0xfb72151b14d1b30a, 0x3f, 0x7, 'syz0\x00', 0x5}, 0x1, [0x1, 0x4, 0x9, 0x795, 0x1, 0x8000, 0x2, 0x2, 0x6, 0x4, 0x1, 0x40, 0x81, 0xce, 0x4, 0xc7, 0xe8, 0x3, 0x3fff800000000000, 0x1, 0xc5, 0xbdd, 0xff, 0x6, 0x5, 0x9, 0xffffffff80000000, 0xbf, 0x2, 0x7f, 0x6, 0x7, 0x9d, 0xffffffffffffffc0, 0x3, 0x8, 0xdb, 0xeaf, 0x0, 0x7025, 0x7f, 0x7, 0x0, 0x9, 0xfffffffffffffeff, 0x400, 0xffff, 0x8, 0xec8, 0x2, 0x6, 0x2, 0x3, 0x3f, 0x100000001, 0x5, 0x6, 0x392e, 0x46, 0xc93, 0x80, 0x1, 0x2, 0x7, 0x8, 0x9, 0x0, 0x9, 0x3, 0x3, 0x101, 0x40, 0x3, 0xed, 0xf83, 0x101, 0x5, 0x0, 0x7f, 0x100000001, 0x1, 0x3, 0xff, 0x3ff, 0x3, 0x7070, 0x5, 0x1, 0xa8, 0x8, 0x8001, 0x100000000, 0xfffffffffffffffe, 0x4, 0xce, 0xff, 0x61025b82, 0x1, 0x2, 0x2a, 0x8001, 0x8, 0xfa1a, 0x8ab, 0x6, 0x0, 0x0, 0xa8, 0xeff, 0x9, 0x6, 0x1, 0x100000000, 0xfff, 0x8, 0x0, 0x3, 0x80000001, 0x6, 0x7, 0x9, 0x5, 0x1, 0x5, 0x64, 0x1f, 0x3, 0xffffffff]}) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) 16:30:19 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) [ 1113.158246][ T4376] FAULT_INJECTION: forcing a failure. [ 1113.158246][ T4376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1113.171477][ T4376] CPU: 0 PID: 4376 Comm: syz-executor3 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1113.180407][ T4376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.190498][ T4376] Call Trace: [ 1113.193800][ T4376] dump_stack+0x172/0x1f0 [ 1113.198156][ T4376] should_fail.cold+0xa/0x15 [ 1113.202764][ T4376] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.208591][ T4376] ? perf_trace_lock+0xeb/0x510 [ 1113.213461][ T4376] ? mark_held_locks+0xf0/0xf0 [ 1113.218299][ T4376] ? zap_class+0x460/0x460 [ 1113.222736][ T4376] should_fail_alloc_page+0x50/0x60 [ 1113.227955][ T4376] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1113.233331][ T4376] ? find_held_lock+0x35/0x130 [ 1113.238120][ T4376] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1113.243870][ T4376] cache_grow_begin+0x9c/0x850 [ 1113.248638][ T4376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1113.254881][ T4376] ? check_preemption_disabled+0x48/0x290 [ 1113.260606][ T4376] kmem_cache_alloc_node_trace+0x658/0x720 [ 1113.260624][ T4376] ? __might_fault+0x12b/0x1e0 [ 1113.260650][ T4376] __kmalloc_node+0x3d/0x70 [ 1113.275710][ T4376] kvmalloc_node+0x68/0x100 [ 1113.280247][ T4376] ? seq_dentry+0x2d0/0x2d0 [ 1113.284769][ T4376] seq_read+0x832/0x1130 [ 1113.284802][ T4376] ? seq_dentry+0x2d0/0x2d0 [ 1113.284817][ T4376] proc_reg_read+0x1fe/0x2c0 [ 1113.284836][ T4376] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1113.284858][ T4376] ? rw_verify_area+0x118/0x360 [ 1113.284878][ T4376] do_iter_read+0x4a9/0x660 [ 1113.284895][ T4376] ? dup_iter+0x260/0x260 [ 1113.284931][ T4376] vfs_readv+0xf0/0x160 [ 1113.321460][ T4376] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1113.327540][ T4376] ? kasan_check_read+0x11/0x20 [ 1113.332399][ T4376] ? __fget+0x367/0x540 [ 1113.336577][ T4376] ? ksys_dup3+0x3e0/0x3e0 [ 1113.340988][ T4376] ? check_preemption_disabled+0x48/0x290 [ 1113.346707][ T4376] ? wait_for_completion+0x440/0x440 [ 1113.352002][ T4376] ? __fget_light+0x1a9/0x230 [ 1113.356690][ T4376] do_preadv+0x1c4/0x280 [ 1113.360936][ T4376] ? do_readv+0x290/0x290 [ 1113.365264][ T4376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1113.370721][ T4376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1113.376176][ T4376] ? do_syscall_64+0x26/0x610 [ 1113.380852][ T4376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.386935][ T4376] ? do_syscall_64+0x26/0x610 [ 1113.391649][ T4376] __x64_sys_preadv+0x9a/0xf0 [ 1113.396331][ T4376] do_syscall_64+0x103/0x610 [ 1113.400931][ T4376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.406835][ T4376] RIP: 0033:0x457e39 [ 1113.410742][ T4376] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1113.430359][ T4376] RSP: 002b:00007f9755406c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1113.438785][ T4376] RAX: ffffffffffffffda RBX: 00007f9755406c90 RCX: 0000000000457e39 [ 1113.446752][ T4376] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 16:30:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x4000) 16:30:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1113.454723][ T4376] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1113.462693][ T4376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f97554076d4 [ 1113.470663][ T4376] R13: 00000000004c4962 R14: 00000000004d8190 R15: 0000000000000004 16:30:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x400) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) 16:30:20 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00'}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0xfffffffffffffffe, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000040)=0x8) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) [ 1113.592064][ T4690] Unknown ioctl 25631 16:30:20 executing program 3 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x200000) 16:30:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000100)=0x60) shutdown(r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x8000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = shmget(0x2, 0xe000, 0x100, &(0x7f0000fef000/0xe000)=nil) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) r5 = getgid() times(&(0x7f0000000680)) r6 = fcntl$getown(r0, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)='vmnet1\'\x00'}, 0x30) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000380)={{0xffffffffffffff66, r2, r3, r4, r5, 0x100, 0x1}, 0x1, 0x101, 0x1, 0x1578, r6, r7, 0x4}) mount$9p_rdma(&(0x7f0000000400)='127.0.0.1\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x10000, &(0x7f00000005c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x6}}], [{@pcr={'pcr', 0x3d, 0x2a}}]}}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1113.827982][ T4940] EXT4-fs (sda1): re-mounted. Opts: 16:30:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x400000) 16:30:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x200001c6}], 0x1, 0x0) 16:30:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x10000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1113.910454][ T5075] EXT4-fs (sda1): re-mounted. Opts: 16:30:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x28) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000000000005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x1000000) [ 1114.136432][ T5257] EXT4-fs (sda1): re-mounted. Opts: [ 1114.203539][ T5384] EXT4-fs (sda1): re-mounted. Opts: 16:30:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf0ffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x18) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)={r3, 0x0, 0x8}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000040)={{0xffffffffffffffff, 0x0, 0xff, 0x763e2ceed7ec80e2, 0x8}, 0x2, 0x100, 0x81}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f00000001c0)={{0xf25, 0x8001, 0x8, 0xb7, 0xffffffffffffffe1, 0x800}, 0x9}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000000c0)={0x77359400}, 0x10) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000200)={r2, 0x80000, r1}) 16:30:20 executing program 0: mkdir(&(0x7f0000000300)='./file0/../file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = open(&(0x7f0000000200)='./file0/../file0\x00', 0x200, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x3, 0x1, 0x6, 0x6597, 0x9a, "b5ef0ca26e08e1f1f021daa8f1214de85521fdc1797ec9854c3a0fb85a46197c712f977db2d72d6d115b6a4cfcfd147e160af417ea93759766ee6db24fdbd7c7d6a5ff723c3b7db2dd1fd2d0836d870863eb1b5412182f60917b460f58bd2b465191999fd55e2b42aaee8b8759bbb4405305789fd60f60ab2522a85075b0c4a5c9f3ac20e8e46d72fb60ab8e45b06cdfc0f98019244c4a814e23"}, 0xa4, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r1, 0x6, 0x10}, 0xc) 16:30:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x4000000) 16:30:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x81, 0x0) syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x9, 0x101000) syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x2, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x7ffff000}], 0x1, 0x0) 16:30:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x30101, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x7ff, 0x7fffffff, 0x5, 0x7a5e, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x0, 0x20, 0xffffffffdf943c13, 0x3}, &(0x7f0000000200)=0x18) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) futex(&(0x7f0000000000), 0x8c, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080)=0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000300)={0x40, 0x5, 0x4}) 16:30:21 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x1a, 0x2, 0x8000) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x9, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}}, 0xffffff45) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={[], 0x1b}, 'nr0\x00'}}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x4, 0x7}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r1, 0x1}, 0x8) 16:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x3f000000) 16:30:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf83f0000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x200000a, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x202200) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x10000, 0x4) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, &(0x7f0000001300), &(0x7f0000000100)=0x60) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f00000000c0)={r4, 0x2}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1114.615788][ T5810] EXT4-fs (sda1): re-mounted. Opts: 16:30:21 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = shmget(0x1, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x2, 0x0) 16:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x40000000) 16:30:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x100000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x8, 0x0) 16:30:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x9cf5, 0x8001, 0x1}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x2, 0xff19, 0x0, 0x100020, 0x0) 16:30:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x200000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x300, 0x0) 16:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x400000000000) 16:30:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r2, 0x22, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'caif0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x404c015}, 0x40) 16:30:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x600400) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000080)) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0xf000, 0x0) 16:30:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x301001, 0x0) ioctl$sock_proto_private(r1, 0x3aa, &(0x7f0000000040)) 16:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0xffffffffffffe) 16:30:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x300000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0xfffff000, 0x0) 16:30:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000300)=0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x8001, 0x3, 0x101, 0x1, 0x0}, &(0x7f0000000180)=0x10) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x8000, 0x8000000000000, 0x401, 0x80000000, 0x8, 0x9a6, 0x0, {r2, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x401, 0x551, 0x0, 0x215f}}, &(0x7f0000000280)=0xb0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000002c0)={0x0, {0x9e7}}) 16:30:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x280000) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000040)=""/100) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0xffffff1f, 0x0) 16:30:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x20000000000000) 16:30:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x204300, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff9c, 0x0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000240)=""/174) 16:30:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x400000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0xfffffffffffff000, 0x0) 16:30:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=@deltclass={0x2c, 0x29, 0x20, 0x70bd2b, 0x25dfdbfe, {0x0, r1, {0xa, 0xfff3}, {0xfff3, 0xfff3}, {0xfff7, 0x7}}, [@TCA_RATE={0x8, 0x5, {0xcbe, 0x8}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x8, 0xc22, 0x6, 0x1, r2}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x100000000000000) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x2) 16:30:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x400000000000000) 16:30:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x200000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) tee(r1, r1, 0xfff, 0xc) 16:30:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x500000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2c, 0x5, &(0x7f0000000300)=[{&(0x7f0000000100)="27b9221751bc6309ec162dea640240ef167510e8c26dad9323ba0e52d4cb129e0f4d35edc283929a1d923bc43c05d32a2a9ff9bdc02d0d8a369619c97655dca38f", 0x41}, {&(0x7f0000000180)="149e1aa70b0c6383846dd71316c95aeee2637388fa3007fbe82092a16485e1510f8a5870f17897672224e922800e237ef2b87173584e457b4163e387f1eea6083cd2550aa33a2be6d3e6a64928d05d4d5d623fe80b435284e93dfb47ca44092de0e1b3cf76e873a3da8ad3c0184509da2eeca494bf482b7470221f7ba80980643ca8d5b397223edc1366a182c7abfcac1ecc93500e661670", 0x98, 0x1}, {&(0x7f0000000240)="b664e442c6d6dd0b89307665645df93b32b61d8740b4a79279de590010b9f13af3f5e5975ac1e47b4465b5dbcae11a7979ead33e681ce715b057c1d2646309d7e5737aac40b714b4d26846db352a95d3de4de015708f699a513979d10ffe8bf36762b10c338ea6a34501224f31a9b7f35f66dfdf5453ca3f09e67a539531ec", 0x7f, 0x800}, {&(0x7f00000003c0)="b922bbe96dd86d2dd8ac29968b3f8c1d8a97da29082f78e3c1ee2894f79a7478d5122669dea6b84b8300421346b3583e4966b795b98f5fabe812ca7e287b1cd65b19736aaab42dc090b66e54da85c783f3fe6a591d9fe52e2c170dc2671f01cfcb07c8d8379f75f4521da30fab960e71229639ffe6cb0060e8cc68746580e13399b82040cdc7005dcd037789a8df6b71486035daf89823b1f9593fa920b8e539f8bf6e3bf9748dd80ddd5d00c71ebfaaca85a72297a124dabcce8648f1fe81c6b2e89ffceee88f7db9a894f14e303d52604e766b46d9e5cc35b084bc628a4a23c2f1cc531b69903c478ee1", 0xeb, 0x100000000}, {&(0x7f00000002c0), 0x0, 0x8001}], 0x4008, &(0x7f00000004c0)={[{@data_err_ignore='data_err=ignore'}, {@i_version='i_version'}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@grpid='grpid'}, {@bsddf='bsddf'}, {@barrier='barrier'}], [{@context={'context', 0x3d, 'staff_u'}}, {@permit_directio='permit_directio'}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000002c0)) r0 = shmget$private(0x0, 0x1000, 0x430, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x8) [ 1115.858569][ T7114] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x10) 16:30:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x3f00000000000000) 16:30:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0xc0000, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x1, 0x2) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000380)) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x404480, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000003c0)={0xfe2b, 0x1, 0x0, {0x9}}, 0xffffffffffffff5c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2980, 0x0) dup2(r0, r0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) getpgid(0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs(r4, &(0x7f0000000080)='mounts\x00') r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x109000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000140)={0xffffffffffff1b6f, 0x9, 0x7}) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x4000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000680)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000540)=""/246) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4200) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x600000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8002, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000100)={{0x8, 0x3}, {0xfffffffffffffff7, 0x7e6}, 0x7f, 0x1, 0x6}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xb0030) 16:30:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x220240) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x1000000) 16:30:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x4000000000000000) 16:30:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x700000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x2000000) 16:30:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x200, 0x9, 0x7, 0x8}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x200, 0x0, 0x0, 0x100020, 0x0) 16:30:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000000)=""/174) 16:30:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x8000000000000000) 16:30:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x4200, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x4}, 0x1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000040)=""/86) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x8000000) 16:30:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x1000000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0xfeffffffffff0f00) 16:30:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) shmget(0x3, 0x4000, 0x82, &(0x7f0000ffa000/0x4000)=nil) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lgetxattr(&(0x7f0000000040)='\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', &(0x7f0000000100)=""/159, 0x9f) 16:30:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x10000000) 16:30:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0x5, &(0x7f0000000040)="d94edfc2f027c1d2736c90d7db8d302aa0796d0f7848bd31cbcf61dda5780f430a2fe63dafc2c00cf048d34b1d5c5fe62f5cd477c2ac67c9c363d244ca77d069c181f35809c32f60d7fee2751f2e3e0947092a5ef9"}) 16:30:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x2000000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0xffffffff00000000) 16:30:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x100000000000000) 16:30:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='/loeth1\'.\x00', &(0x7f0000000140)='vboxnet1\x00', &(0x7f0000000180)=':\x00', &(0x7f00000001c0)='bdev}\xb6\x00', &(0x7f0000000200)='vboxnet0%\x00'], &(0x7f0000000400)=[&(0x7f0000000280)='[-))\x00', &(0x7f00000002c0)='{}systembdev&\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='^^!\x00', &(0x7f0000000380)='vboxnet0\x00', &(0x7f00000003c0)=',:\x00']) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffe9e, 0x0, 0x4000, 0x0) 16:30:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x3f00000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3, 0x8, [0x8000000, 0xffffffff80000000, 0x9eb8, 0x4, 0x800, 0x7b, 0x0, 0x100000001]}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0xbf01, 0x200, 0x1, 0x101, r1}, &(0x7f00000000c0)=0x10) socket$inet6_sctp(0xa, 0x0, 0x84) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6f42, 0xa800) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000140)={0x6, 0x5, 0xdd18, 0x3, 0xb0db0, 0x1c, 0x9, "4032cbf52d3e4789c854726f5f2621d2e7155399", "e3452407d718487832c429dd0d3c23a78a20ea50"}) 16:30:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000000)={{0x10000}, {0x9, 0x7ff}, 0xeda, 0x2, 0x4ab360eb}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x200000000000000) 16:30:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) alarm(0x9) 16:30:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10100, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x6, 0x5, 0x1}}, 0x28) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x800000000000000) [ 1117.100773][ T8666] EXT4-fs: 11 callbacks suppressed [ 1117.100784][ T8666] EXT4-fs (sda1): re-mounted. Opts: 16:30:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4000000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) 16:30:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001880)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000001940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10200002}, 0xc, &(0x7f0000001900)={&(0x7f00000018c0)={0x40, r2, 0x0, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xe35}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x10) r3 = dup2(r0, r0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x60, r4, 0x502, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x60}}, 0x0) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000000c0)=""/64) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x600000, 0x0) write$cgroup_subtree(r5, &(0x7f00000017c0)=ANY=[@ANYBLOB="2b72646d6120006d65042172792094476aebff4b19dfec676d565599b5bbf93a254ff4becaf76a4eb5249d0f35abe078dc42c566e307d9e445a366326a272d3c7f2377612c9c50baaab5affd208bb3de235d8452be48d165125a16830e02c9b9f626fa57beb76d4442311ec0e4d7e71692e5f955750d4441e61cc188661f8906f5cb68c972312c39ef12f3cd13591287c8891183ae7027f968"], 0xe) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x240582, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0xe0, 0x800, 0xe851, 0x7, 0x0, 0x2, 0xef2a4e9dfdfbed8f, 0xa, 0xfffffffffffffffc, 0x0, 0x401, 0xdd6, 0x3e0, 0x2, 0x100, 0x8, 0x1, 0x8000, 0x939a, 0x3f, 0x5, 0x5, 0x8, 0x5, 0x7f, 0x1000, 0x80000001, 0x7, 0x8, 0x1, 0x1f, 0x4, 0x5, 0x2, 0x6, 0x6, 0x0, 0x3f, 0x2, @perf_config_ext={0x7, 0x8}, 0x8000, 0x0, 0xff, 0xf, 0x7, 0xea, 0x1}, r7, 0xc, r6, 0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x300000}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000540)={r8, @in6={{0xa, 0x4e23, 0x80, @local, 0x8}}}, &(0x7f0000000400)=0x84) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000001700)={r3, r5, 0x1, 0x1000, &(0x7f0000000700)="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", 0x1, 0x1229, 0xff, 0xffffffffffffff00, 0x2, 0x3, 0x9, 'syz0\x00'}) [ 1117.273276][ T8880] EXT4-fs (sda1): re-mounted. Opts: 16:30:23 executing program 5: nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x100000000000c0f9, 0x10000002}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x80000001) setregid(r1, r3) fsync(r0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x1000000000000000) 16:30:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x80000000066) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:23 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x10000}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000080)=0x1c, 0x4) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x87, 0x0) 16:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x67ffff, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e21, @empty}, {0x7, @remote}, 0x50, {0x2, 0x4e21, @local}, 'ip6erspan0\x00'}) 16:30:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4800000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0xcd01, 0x1e8}) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0xffffffffffffd95, 0x0) 16:30:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x280000, 0x0) 16:30:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xc, "5630c6a95a5e8b6e06fd82f0d122e5e0c17e0eca03809bfbf44d1111f05934cf3f4336f8917371ed149a37127dcb4c8270748744a6110d38d1bb2c3d7450c2e36a3c1d45059f02bcf5566298a4f4ebee01000000c48aebf66bbcb3315262efdb0510113109e95049cd9130b1de2ba08da3e68db27132ecc0f7765e97a45e529bb4b8ebd8eca456a03e06"}, &(0x7f0000000100)=0x92) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x3}, &(0x7f0000000200)=0x8) recvmsg$kcm(r0, &(0x7f0000001700)={&(0x7f0000000240)=@ax25={{0x3, @null}, [@netrom, @default, @remote, @netrom, @bcast, @default, @remote, @rose]}, 0x80, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/124, 0x7c}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/114, 0x72}, {&(0x7f00000013c0)=""/150, 0x96}, {&(0x7f0000001480)=""/197, 0xc5}, {&(0x7f0000001580)=""/126, 0x7e}], 0x6, &(0x7f0000001680)=""/113, 0x71}, 0x40) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r2, 0x0) 16:30:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) fcntl$getflags(r0, 0x408) 16:30:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x4c00000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000100)={0xd, {0x2, 0xffff, 0xb9, 0x1}}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x10001f, 0x0) 16:30:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/172, 0xac}], 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x800, 'syz1\x00', @bcast, 0x9, 0x2, [@default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @null]}) 16:30:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x4000000000001, 0x2011, r0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x4, r1}, {0x2, 0x5, r1}, {0x2, 0x4, r1}], {0x4, 0x1}, [{0x8, 0x4, r2}, {0x8, 0x3, r2}, {0x8, 0x6, r2}, {0x8, 0x2, r2}, {0x8, 0x4, r2}, {0x8, 0x5, r2}], {0x10, 0x2}, {0x20, 0x6}}, 0x74, 0x1) 16:30:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8441, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/196, 0xc4, 0x40000001, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:24 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000440)='coredump_filter\x00') r2 = semget$private(0x0, 0x4, 0x20014) semop(r2, &(0x7f0000000000)=[{0x5, 0xb7e, 0x800}], 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0x2, 0x8, 0x2cd}, 0x25, 0x1, 0x0, 0x0, "5e81d8b8128c5fccacb4e6e3aa7235546cc8c2241fa57975a3fa8f04c77aa7b064f26d99b6184f2d0474cc6cd92296ff6822783ca99adb5e2e3479cfca608022"}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) semget$private(0x0, 0x47, 0x200) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000400)='./file1\x00', r4, r5) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6000000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) socketpair(0x5, 0x80002, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) 16:30:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2400, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x30, 0x4, 0x0, {0x6, 0x7, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) 16:30:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x2, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8001, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0x0, @remote, 0x6}, {0xa, 0x4e23, 0x7, @local, 0x8}, 0x100, [0x100000000, 0x7f, 0x1ff, 0x5, 0x401, 0x1, 0x24a, 0x2]}, 0x5c) 16:30:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) setrlimit(0x6, &(0x7f0000000040)={0x3, 0x8000}) [ 1118.138102][ T9782] EXT4-fs (sda1): re-mounted. Opts: 16:30:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6800000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:24 executing program 1: mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) [ 1118.264725][ T9869] EXT4-fs (sda1): re-mounted. Opts: 16:30:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001680)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000340)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x9, &(0x7f0000001580)=[{&(0x7f0000000100)="c8fef8ac78ded2d1ec995f570b78e7e8c299c84979fdd5f15ce6dc428d4fb43eaa2ba6108eb1b6a27bf38a4ae3e7f7b95df443057f57", 0x36, 0x7}, {&(0x7f00000003c0)="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", 0x1000, 0x7d62}, {&(0x7f0000000140)="65633f9d9823f2b5ada49bb204cce9e1a4d23ccc00179a5c07b7eb146328f3322993364327ff6221910f4186d3105ac9455c9b7d3e41bd3fb898faa817a78106eb0bb681ca8de19b068b0e9b49b5245d54a4eb5c2d3edf755ce0f06bf2e8f88e5ca40d6ef6c29447c7c3", 0x6a, 0x101}, {&(0x7f00000001c0)="7d96a1052f7d1763cff3278a4fa18e782c6223b3c49eaed4a679759733190d", 0x1f, 0x5}, {&(0x7f0000000200)="4ed53cee80fbbc52f67227611a018991d93e18d4c6fbcb0b8295b7c5ddf8727b941872374b6100e5335930736eaf22dfec7c9c2a1731241a9300e47a7ae008230850764fa1da01a1618e1eaf035696da86e52ccc89790ab46a790656b491b7b5a04a2b958d364e1a741f6bd0c7f6aef26de694e20a9aaec34010392d4bc9597533d4b76725fec48cc764e341f904431f055717bdcc060428c74645756489b7b33d0d8f3d2ee20fd36007c8de888166e27ec2f88fbb40dd70", 0xb8, 0x4}, {&(0x7f00000002c0)="35f124f3ba42c18cb18178466ab33136f31d1abc7e3eed650baafaaaa57d98fa33d2317dabd3ab46039fc8cf89dd19bf81fcef6575ae2286e2c21f350d66da4a27c488f13a21c5993999", 0x4a, 0x7}, {&(0x7f00000013c0)="855cc35f70d24d5170b3d8442edcefcb9e76038fe23e583aafbef4588e0d55299ded635794b288afe14ccc908eb0ec0d87b2ca4575441c0cc3b4b03af80946804359fe0d276be70bc79317464b4b17eac2430d2e50a83d", 0x57, 0x1}, {&(0x7f0000001440)="ce57128fcaaa200b205377eeb035b086ff5d12d530c922f84faf57b1ab61e02809e870697f8712112d44e98f428c0db801c8ccaf4a263b6ff03d33aa477d60399a54144241a13c1709991d5a331b53c8", 0x50, 0x100000000}, {&(0x7f00000014c0)="40b0e364baebf6e5efd0a328c0a323665fee4d785d051038eedf317de5727117f841ed22aa089f29097558058e059df1a39f1d0610471dd2577ca4060cf7b40e929844e9c2ee02e0d5355fd2a75f7f193e24f5c492d1c8500c47f04fab57fe2ef15edeaa9ad876a3b279b751ef3bc25a795a2c54965ebd8b6d8c6ce18ae1e35416270dafef43534e9be12d2c40dca85e294033f386660cc195567f477e08e3bede7eeef43147", 0xa6}], 0x800000, &(0x7f0000001780)={[{@expose_privroot='expose_privroot'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 16:30:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xa0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x1010c0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1, 0x4) 16:30:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00') socket$l2tp(0x18, 0x1, 0x1) 16:30:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c654245, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x6c00000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xb1, 0x800) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000300)={0x3, 0x1, 0x10b4, 0x401, 0x1, 0x9}) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x4000000, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000240)=""/174) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x8000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x8, 0x74d}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000140)={r4, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}}, 0xffff, 0x7c, 0x8, 0x1, 0x9135}, &(0x7f00000000c0)=0x98) 16:30:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@bcast, @null, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1118.603026][T10219] EXT4-fs (sda1): re-mounted. Opts: 16:30:25 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000300)='net/sockstat\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x34, 0x0, 0x1, 0x0, 0x0}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0x4, 0x6, 0x4, 0x100000001, 0x9, 0x6, 0x40, 0x3, r2}, 0x20) r3 = syz_open_procfs(r0, &(0x7f0000000280)='net/ip6_flowlabel\x00') preadv(r3, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) socketpair(0x0, 0x1, 0x7, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x8a) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000180)={r4, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000002c0)={r4, 0x0, 0x100, 0x4, 0x5, 0xff}, 0x14) 16:30:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80100, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000180)=0xffff, 0x4) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000001c0)=0xfffffffffffffff7) time(&(0x7f0000000200)) [ 1118.693109][T10306] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "defcontext=root" 16:30:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000200)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000280)=0x80) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x3c}, @call={0x85, 0x0, 0x0, 0x4d}, @alu={0x4, 0x2b, 0x7, 0x7, 0xf, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map={0x18, 0x9, 0x1, 0x0, r1}, @ldst={0x1, 0x3, 0x0, 0x8, 0x5, 0xfffffffffffffffe, 0x4}, @exit, @ldst={0xfda4c55f1acd19ab, 0x3, 0x7, 0x5, 0x3, 0x50, 0x4}, @generic={0x1d8e20000, 0x15ac319e, 0x6, 0x80}]}, &(0x7f00000000c0)='syzkaller\x00', 0x9ec4, 0x80, &(0x7f0000000100)=""/128, 0x41100, 0x1, [], r2, 0xf}, 0x48) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1118.773372][T10306] EXT4-fs (sda1): re-mounted. Opts: 16:30:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7400000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1118.833330][T10535] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "defcontext=root" 16:30:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1, 0x4000) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r3, 0x20, 0x70bd27, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) 16:30:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380), 0x1, 0x55) 16:30:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400000) bind$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved}, 0x10) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "706da4d55435a08f9d3a89b5592a0366af23ac22"}, 0x15, 0x1) sendmmsg$alg(r1, &(0x7f0000000c80)=[{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=[@iv={0x60, 0x117, 0x2, 0x4c, "7748684a09905e8396c894fb57a32ccc3e32076f755a0ff8722081d48c7254a22fa87697d2ec768c7f2b9cfb21fa97d9981ce5b564162f6cbe04dae04026c9f820cf9fc9355ec1f55d061009"}, @iv={0xe0, 0x117, 0x2, 0xcb, "34406d64921fdd8080484376cf6548cf9012c5b8292980c5c8ddf3670aeabdeb99b86f3809257e1f3b16a97f63335f08c96ae6992628bc3f33f4b0e7df25f69b6cd946941dcc5b44450ec096d7369b7d7c94127ce8215985a81c7d254525cb67e349713891218b045662424c5629d5107296b418a4222768d5fce8215bf8f3780b849c6db11b19dd3aa118448ec7c37d2ecef3eda05e2241d050f4b46206cd87f91935e6e58834c9adbf3e199c301d1bf744bccad2215d974097a08c38535300c6c49d23ad9a84dea8687a"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x170, 0x4}, {0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000780)=[@iv={0x68, 0x117, 0x2, 0x52, "f26f488d12d6ce9ea4ebde9b2b0aa77ac90103ee2b721520c9e8c3c281aadede60006df2f2264fde899dd6a8a9564a78c5dbfc54a0400bb9df64051c0a0e1e09ba0bf928d534bf928e346e73bd226ee5a861"}, @iv={0xf0, 0x117, 0x2, 0xdb, "1220148e866fe94ee181ea4f5093476983475a824d40e4761f914dc034bed6ac64ccc3ccc7f2e1b564cc95daea05d4d2fa733e2e3ecec63ef974dca8484f106061836778b5a4f9f53f7004a54e642b342cbc7cee1879b3f4416d3cd85667d2e650681b852d2d3e8e3da2e583227899803bdd828fadb37ebd418c646c0691bbb583a89d8362e06a5e90547a2a3bb73b4fee20449f1b4c407f2133ca72cc76cd74c476119ef2bdc0b7b584458e51b2120cbff7ce6c65fbe3120518ab1ec0c9db67a39cf7c4caea5ec2c1eef74a7fac71e4d91d24e6f0571142458b94"}, @iv={0x50, 0x117, 0x2, 0x3b, "72066b55af8c2e405dcc87b0176d618fd631deb15418e9ad743b50f9f5e71bf70adab59a7df8f6b8f9b82db821de6c4d28d3edb1773cf7d7e9f2b2"}, @iv={0x18}], 0x1c0, 0x40}, {0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000940)="0270df8ec588ec76a80be7a601ac09db9e19897c83eb93f4e7b1c04c8ba24ebe59ad561a057605d16a75d908b944be3638e1353608870daf6839cb71a18d", 0x3e}, {&(0x7f0000000980)="98d8b54d5a373671cf61e3119422ed997a5312561d8be80a654cf6071ca0300b0fee4d3ee017618e338e238952db2fa3773646", 0x33}, {&(0x7f00000009c0)="10362c40064d8d684730dd6a7f2e3b58cc5253dfc0044417afe0efb7f716467666b26c65b187eec06c62c7694c5d9a637803c30a55ca692bcea82e037a1975ed3e5ff322b0fce45f7344b85297165d6d1031c39a25b46a62b8a34d276d1dc1da058050434732a6a997f4b7ecc813a2eb652fa909e0a9543f69d691e3045fa88122e25b789be90e7a60ffb95894d091b88f266ac542e3fb88a714ab1936", 0xfffffffffffffd8d}, {&(0x7f0000000a80)="c873fcac27b1ba8c6de1bb23979b8ca69fed0f86f40b1e30832dcc6b7889ea1e666d5b50eb28ced245a5222f17b8f2d75d42afa24fb9fc103c6f170ff7479b1b6bf4477bc5b0d461eae07a30b7de", 0x4e}, {&(0x7f0000000b00)="eddf37466a464bdeffd24ee8c11b8960b09f93efa6f1ca91d39c6d75b68782ec7461616cc3ca7c81c0e4d2abec6b14af33253a30291fc944dc1f7df49afbca98df4beda18e0a7d6d20e184aad9c1076a09bf798dfd68ec8dae138d93cf939f28f59a4210d141847bbf843774cbe0cf3986fe375e9bc5", 0x76}, {&(0x7f0000000b80)="6305ddf1634f2cb8925d033f00120f92d8caf1e0bec0ac2e0b11ad7ca01809543554a5f257f301ce534052b80df46bb810fc9e2064377bcb997031989388b6e77177a0e7f0abaf584a2e8ad906d3751a55f674909173c296f7ea3c8f8917273c27859930aac98bb4952e3e9ca00aca1c8f14e26e48ac", 0x76}], 0x6, 0x0, 0x0, 0x810}], 0x3, 0x8804) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x58030, r0, 0x100000000000) 16:30:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x10000200, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e24, 0x7, @loopback, 0xffffffffb40576ab}, {0xa, 0x4e21, 0xfa72, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5}, 0x2, [0x8, 0x1, 0x401, 0xfff, 0x89, 0x3, 0x56e1, 0xda3f]}, 0x5c) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x7a00000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1119.134350][T10801] EXT4-fs (sda1): re-mounted. Opts: 16:30:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x60dc3b2e, 0x74, 0x8, 0x7ff}, 0x10) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:25 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000240)=""/174) 16:30:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) [ 1119.216617][T10898] EXT4-fs (sda1): re-mounted. Opts: 16:30:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9d, 0x1074c0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x16, 0x14, &(0x7f00000000c0)="e85e0b6526fac6605e8609bfa05bd75d04f72d84b283", &(0x7f0000000100)=""/20}, 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x25, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x4, r1}) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x244001) sendto$rose(r2, &(0x7f0000000140)="f6ef49ec7799de3e87628633bf53671704963370147051aa67fb8e92aeff501a7433c24dd425535e2f3e2afa3837d2fa291a1468ec319bb66a6077c408bc6d27046f8e99bc", 0x45, 0x40000, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) 16:30:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000140)=""/174) 16:30:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400080, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x8) 16:30:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x8cffffff00000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) [ 1119.444112][T11083] EXT4-fs (sda1): re-mounted. Opts: 16:30:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2, 0x200881) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000280)=""/239) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x7f380f3f}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000480)={0x5, 0x0, 0x1, 0x1, 0xffffffffffffe663, 0x2, 0xffffffff, 0x6, r1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@remote, @in6=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0x52c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x1, 0x0) 16:30:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001f00)='./file0\x00', 0x40, 0x10) sendmmsg$unix(r2, &(0x7f0000001dc0)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000200)="be249bfb4c2b040fdf9562c1f52b009b916130839dc72d061d0a167cf6a26ba0d89390cef2eeb8202be542b2ccabe62c31174c17000a847524e47326d7d3baf4a127bbd76b4ebec6857e11cefc85bf24039f37fe2691ba270092404a12ceeeaea237e21a3c", 0x65}, {&(0x7f0000000280)="cd763e7d2e5a4f2575d01b06aacd25a2208c69d520789ac88f8dff0aee68c72991e2bb218f95cdfa5ab81f2536eedeefe710c1099cd1b43572ac3c090d3a5bccf7f0de1451d334318789f4aa6a6b2d735b0f97f3591837b5a2635a19bb499a2bd6f0d1c3d2df48c796e85b6cf75108c122f617ee01a94e86bed3ef6f6d8e565ba6fee993ae4084e8c65e4402351ed4c6eb8001ba078bed3600d57fbb9340bd5a7f74f3ccc8fb6776c45aeaa34fc38f0aedd0f9b2edadbe5d9ed1624392309ff7f8fdc9d72825ae7c4d5533a8d847230dc51e3c35b39bfe277fe9254182b81b80144448aaa1a36c2a2539ba438e53c036676d6ebc7e54cfee", 0xf8}, {&(0x7f0000000380)="0a7341e7b19b9124b30ca8c6d8eb31c0f941785af791fe210809e2f07e63127126d1c75d39848fd4152550d6dd88de51391d9bb86dfd1116cde40771bb77cc72d0253957d5a38b83a2e8c47fe0f85b6541af9a90482055b7cb08265edc7ebbee1baddd7500e958d3cdde7f590bb89d1553c8d6e3344bdc147249517451135b3469cfb6813996341dfbc3ffd5907c7d012af8ea9d851e31ef0c294cd867eba637dc933a032dd6", 0xa6}, {&(0x7f0000000440)="905cc18dc69d0f0871ed6ac1c02f979fee556126b2660d5f8c93f1eb251138c3b486cb034290d0cfb9682bc41f8441009b985e0f5863fda36a109fd47ae0fdd288a88b0264b601a579a6c3c49310d3bd12e0082b4fc134076f92639fccc92f63e87ef0614fdf5f44d2a04804bcb10e1a5677489e6b7bffb3e7fa9885ddd3b0eeb3f00f2196af297130553d811ef7b5ace9df45780543b5bd88dc613eeb0ee01353a42b745b", 0xa5}, {&(0x7f0000000500)="62e0605868e3d59571d7732118db75a27421925ebf5ed3e526584cd3ad9ac299e9d27f968c522ef3457847e898b7a704bc8fff741707fea308164bce0a32806a57ada5694a583eb9cd7834473db8860f6453b79475fd4641e05e7e60f0df50a248c0ad5e3d6d4f47bec81164f120b7cb520b1840b192f36a7f371df80f0ed204b0945514e23dff396c020d8ad631ff3e5e0fc3d2c30818f0", 0x98}], 0x5, 0x0, 0x0, 0x4}, {&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000006c0)="d8e37195e53701433886dc9bb87a56cc863a6584cbfe9d5170c57b1d10a6db8f32b123f174729841028688373f04f495f49f24d7fa0b075ea419096489b1178e0abbf1ac2a4bd651c666a1574f550a6bb2c08643114813c8ab59cb5f682393da5101ba3eda4992fcea8c96e13d37b05e53d9d4b61acf19235ce167dcc816d6afe61ec09460460c0325606853", 0x8c}, {&(0x7f0000000780)="d0c7eaf0c59f74fdfc852dd5e2ab79d1c29a7c03a6a4af8348f5cdfb267d4c592da3a2fa36a9f49cd7e92dc94e683e3bfc1cdefbfd7fbdc097b7103a2ec617d3ca0107747fa13540641dc5053cbbf48830534478a2ba", 0x56}], 0x2, 0x0, 0x0, 0x4}, {&(0x7f0000000800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000000880)="e203b214413d19866ccaa478f96dc46bade641222c621f03a529e8ebe38250f8c272cf26cbf11aa108339399f218bceac262a98830a4dca91d200381dc5aa037b7c6448624cf9d134cf9f1428ee899df823ea2ec910c15b47b440c606b52ed1069629924b43758815a2ce6c7f5d674e8df91dabdb3dd5884e2bab0468cdf234d4eadf8a6ed5986d51cd9538cbcb0b355f6f70dcf1a", 0x95}, {&(0x7f0000000940)="6c5f0f90f1e99ec82afbdb0c51338a955c137da779a200b2e80b66412887d7ee2c72651565860407eb2bca626cfdf06e710818456e573b", 0x37}, {&(0x7f0000000980)="bd13efa7b411e897df78e4d0fe544de9e50480a70e006c81a80b300fa0a9576c1b690d5206c29263d4afcf4f5f9b184486b9063a6d89", 0x36}, {&(0x7f00000009c0)="e7bf4be08f0bdf49f4f49fbb7a774b1b46c0b91b23a91a3688e1f47483f4c6e1b33dee9b91aa546539a5020e12b01706984a876ed1cdff61e3f532b166804f1f41e0ec1e72fabfde34c84350c281e8602404ccbf2434fedaa84906eba18d5fb6a146a2543148f03f34dc2f8e240894926b92f473c559a50df7ce5ab9e8b794dea2baff77644fd53630e6f24d1c", 0x8d}, {&(0x7f0000000a80)="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", 0xfe}, {&(0x7f0000000b80)="fd5b362f2b945b5aff84069915bbfe8c1321a73a519bfc917d6e8160aa4e88bb0fa84d295228b5526bb42898222ee490972daa945b38008aa302d0fd6cf074b98313fc67aeea1fb0062679ca2915d7997f13936656bc0cb767b33deac30797495c77f308fd55bba26dd2325af245fdeb10ac58f5a995c76a85ec75503bc224cc005886bed35b48acab28c105a444b8ab1bcc0745ed374c98401044c34f75ce2beac4d3c89cc0bdd60c5df934bf2d076b70f51c876ccbd966f4fb", 0xba}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="1be278f116fc03ae68e2ebe7251c5d4667bb4ad0073c26ecf16da8d1219f10adddc19deb3c7da76e2c4f907e5d569a20722c96a459e31819bb9193744cc9444c367892bee363d5f3923eb5b255248c15b4ccff50b212130354ec30b668a82501de549562f4b55157fb8d2a7bd9322b8f8960f66f328d63a38342c96ae86741048e6cfb5428a5aabf1afef15debe373b868060b225eb15567c57c4482bdc59d084f0c9b364514e2f829a269cbf0a6ce22bce61def177b8398dbde2679d9e0990f920c7fd2fbabedb31a06771e4b03958f95a53a42c9253d0cd215e019e24a837aafa5e9326ec0bd5b6e09957c4050ba895a03d07461", 0xf5}], 0x8}], 0x3, 0x20000004) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000001ec0)={0x3, &(0x7f0000001e80)=[{0x1, 0x1, 0xfffffffffffffffc, 0x26}, {0x80000000, 0x1f, 0x100000000, 0x5b}, {0xd606, 0x10000, 0x200, 0x70f}]}) sched_rr_get_interval(r1, &(0x7f0000000040)) 16:30:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xb1, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000100)="5c1b16ca8e7a1324d3684d0576e2f7c094254779926347f119deb75155342e925632230e36a07b682c6bfb138256637d114456f89c", 0x35, 0x8}, {&(0x7f0000000140)="94d0d29f7938f0cfd2e0ed9fa5f4758b1753d6966076242f88698f6a37f4e08d481f7922ea4e8a91fa8d54cbbb27cc7cddcd585dc488f44cde6f01cb69eaf9daf7dea96c68bedb81115fcdb5ca4c5091d8b14197fc4bf1d88c2ddc82430f1d5fedac98bc065e9c2a6311fbee901c2bb9dcb4cc898605c3c0ce1467a959a5d24b7aae8eacde834f560461ed9ba86487e9f315d537c3ea2921df28087522e9be37ce4b20e82fc86587fcf69b9fa4e9e1ffb0b44bc60eb38cc85cdc1eceea8568c28d256517473afd4f", 0xc8, 0x8}, {&(0x7f0000000240)="45bbfa5e5c1f1f0a18ab64b073f77ac8cd1fb506ed8427f710ca9eab3741c435b67f47930d3cf10b99b2e91a32b91ca6be6dfcb090d2a7a21483091cd5335dbd3f1caaf7e04f697c431e6dc21bcbe5d11de94193098ae6dd30f11dbf0eb2b6fdc44b269d67171b955f6eebb630e48f51e8309cea4426aed05a1842df86927ff61acb4b8b51cd87a4aee7fe397db5114797a4bb627ec3238cda249d66c33b657031127c7fa0fb4c4140bcebbff56a63bc71dd366b068b8115dbaf0ab4a682287d5d7df86617d7d9945011e3fb70c940ed89d3da66bf48736d6e8c", 0xda, 0x80}, {&(0x7f00000003c0)="0ff178a12aaeb63b3c918feed558988ff3d32894e74c1bc3f422641ef67d33dfcfcc13d6ccab4ed2903060254cae6a0f588e9a4a1943507d5ed98d0be2b4feba6c714efbebffcc37c6b0a6cf5ef2c058349c926524de4328cd1195deb82984683eda460457c0530b650eb8c30a250634e054fb65340abd3192958318ea48ffe101282fd1606f94380fd8ed6a0753f979b9f49a3a2acc00e953e39bdfa3d43f941afb887da66ce98193b262ee488aea9eeb058abd57768fd49ddf722a9d5eeb7a52c2f5e7531444b4089db71cf2b9508c9e69ee86dd3bce11b77a1c36e0993f35942f8f7fcdf44bb0d51d907b03753c2664cfd6b35aa6b0df98c5bc", 0xfb, 0x2}], 0x2000010, &(0x7f00000005c0)={[{@nolargeio='nolargeio'}, {@inode64='inode64'}, {@nodiscard='nodiscard'}, {@logbsize={'logbsize', 0x3d, [0x65, 0x39]}}, {@mtpt='mtpt'}, {@logbufs={'logbufs', 0x3d, 0x6}}, {@gqnoenforce='gqnoenforce'}, {@sysvgroups='sysvgroups'}, {@nolazytime='nolazytime'}, {@nolargeio='nolargeio'}], [{@smackfstransmute={'smackfstransmute'}}, {@uid_lt={'uid<', r0}}, {@smackfshat={'smackfshat'}}, {@subj_type={'subj_type', 0x3d, 'GPL'}}]}) 16:30:26 executing program 1: socketpair(0x9, 0x8000f, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @rand_addr=0x7f}, {0x2, 0x4e20, @empty}, {0x2, 0x4e23, @multicast2}, 0x208, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7c1, 0x2, 0x5}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x1010, r1, 0x0) 16:30:26 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x85c, 0x1, [], &(0x7f0000000080)=0x3f}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xc000000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:26 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1119.714052][T11401] EXT4-fs (sda1): re-mounted. Opts: 16:30:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:26 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000000c0)={0x200, 0x1}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0xc000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x117}}, 0x20) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0x0, 0x20}}, 0xa) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0x2}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r5, 0x1000}, 0x8) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x97636c3b98d81a30, 0x2011, r4, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000400)="7d759f846c8e11806603b29b7538a82290069ab21a992136333e3c3edbaf18a432aee60e27ab1f569dbb6b1788f5388328fe7f411ae80d9c34434123303a80de704afed9c35ac263e50c92a5ec6b50346600e9e54377ad2ef700ab2455b379c5fa683cb987ab6105f886869b224607cd9f42b3d32c21fc46f2486f27ad6d5d82a6c9410136fec0ce1f6d18e5e85cbf0fb77680eb54612c676a9e705f15fda25447ab9df2a3c29b594b752f6e83c5c3ea98cc24", 0xb3) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a8a00000", @ANYRES16=r6, @ANYBLOB="100427bd7000fddbdf2505100000080806000800000002a104003f000000c69a9d71c646a7d100110b1b7f469e35dd77b20264eae3bf0b5b3e17532e8177a3f6775324f5058a9a3b28b0cd584320ceef66f64f63c23d91e8474736bf7fc2ee345d881b09cfee01c011d2755567df742ee75c5fac472b84e3d6a774ac12db37a1275aa5766c9b8cf95bf213e5bc1204eb7c"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 16:30:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf5ffffff00000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:26 executing program 3: gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0x5, 0x6, 0x6, 0x200}) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_mr_cache\x00\xady\xf1\x84[\x16\xdev9\xbc\x91\b8f >\x03\x01_YO(\xeeZ\x01r\xd7Vu\x98H\x1c\x90\x84 5\xe7I\xb4\xbfg\x86\xa0\x83\x9a\xa1\x95\x9f\xa2A\xa0\xaf\xca7\xb9`\xd3B\x8e,!\xcdJ\xca\x9e\xb0\xfd8f\x17\xd5;F\x81\xccp\x9e\xb0:7\xfb\xd7\xd6\x1f\x89\xc9A\x15\x80\v\x87\x89\xea\x04^\xf6\xdf\x1cu \x86$\x9dO\xf6Z@\x0e/{\xf7\x9bb\xff\xda5YO\x93\xe3\xc7\x83\x84\x06GTLZ\x1d\x12A[\r\x18\x14\xee\aLq\xa9\xff0M\xf5\x00\\\xf6nG.\xd2W\xb5') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:26 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0xca) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x102, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) bind(r0, &(0x7f0000000440)=@un=@file={0x0, './file0\x00'}, 0x80) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x4000, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x6}}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0x4b36}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1ffe, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x2004, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x9, 0x80}, {0x400, 0x8}]}, 0x14, 0x1) 16:30:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000300)={0x10000, 0x1, 0x8000, 0x4, 0xa}, 0x4) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="34c83d21e8d27410ffdc8b4dce444aa8b6d5f6ed5a698feffcdc0b4a48b4cc1e8f058b40d2e48d048e3c86f7a65cf4b8dd9a9aec76195e9dc860097ed8d99a7bd81f60afbbe593f9609f0519dc718dbedc14f1dcb6a8ac5a2d127bc4b09e272f9401def8000ac0d4e56e69e1b0afa1e7591a6463306df1d504fdf4de279e5b5664ffea1825506016833598695f65bc119ba54203e8c70d636021ab007dca9bf44ebc8b924136e6e05d54517d9b11ecb922c05618b8417fcb8e9ecf021689580e9882f6841ceaeeb87abdf6fcd5b8107bd5a96e016492708ccc6cdb3ccc4976ed7cd81add2bfbb30936a2ba", 0xeb, 0xfffffffffffffffc) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000340)) keyctl$set_timeout(0xf, r2, 0x6) 16:30:26 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x1, 0x125043) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='lp\x00', 0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000000)=""/154) fadvise64(r1, 0x0, 0x8, 0x0) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x80) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000280)={'dilter\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x0, 0x4, 0x1000, [], 0x6, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000540)=""/4096}, &(0x7f0000001540)=0x78) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000140)=""/174) 16:30:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000840)={@loopback, 0x0}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000009c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005540)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000005640)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000005680)={@multicast2, @rand_addr, 0x0}, &(0x7f00000056c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000005700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005740)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005780)={0x11, 0x0, 0x0}, &(0x7f00000057c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005800)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000005900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005940)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000005a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005b40)={'team0\x00', r6}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000005b80)={@local, 0x0}, &(0x7f0000005bc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005c00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005c40)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005cc0)={0x0, @multicast1, @loopback}, &(0x7f0000005d00)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000006500)={&(0x7f0000005d40)={0x78c, r1, 0x1, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xe8}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x0, 0x80000000, 0x0, 0x7}, {0xfffffffffffffd1d, 0x5, 0x6a9, 0x3}, {0xffff, 0x80, 0x0, 0xff}, {0x3fd7a292, 0x64, 0x3, 0xa461}, {0x6, 0x0, 0x10000, 0x1}, {0x8, 0x6, 0x1, 0x1}, {0x68c, 0x4, 0xd8d, 0xfff}, {0x4, 0x5, 0x3}, {0x5, 0x5, 0x4, 0x8}, {0x100000001, 0x8, 0x4, 0x8000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9c2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x1ac, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x81, 0x9, 0x80000000, 0x2}]}}}]}}, {{0x8, 0x1, r16}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x30000000000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfd}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x1b8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1, 0x0, 0x7, 0x58c}, {0x7, 0x80, 0x9, 0xffffffffffffff81}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xa18}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r24}}}]}}]}, 0x78c}, 0x1, 0x0, 0x0, 0x40000}, 0x40011) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') 16:30:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000004c0)) r2 = msgget(0x1, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) r6 = getgid() r7 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r0, 0x0, 0xd, &(0x7f00000003c0)='usereth1user\x00', 0xffffffffffffffff}, 0x30) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000440)={{0x6, r3, r4, r5, r6, 0x80, 0x7}, 0x5, 0x1, 0x9, 0x4, 0x100, 0x0, r7, r8}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000580)=""/45, 0x2d) 16:30:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf6ffffff00000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:26 executing program 0: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000100)={0x73, "781d813a26ad61d4f0171ffc15e0dfce28195a0b831704842db1eab86c22790fca6af2faece535dc14108a1b4634991537799fa410bfa776e67381af8c4869a1a7b3ae0842ac7d41dcb0245a08d9b799e38ef0af51e6357a68de7bae435fa55126023884ccc467cade9a57e511816cabce02f0adf1f11742c9ce7875639df0d4"}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00') 16:30:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x3, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = getpgrp(0x0) timer_create(0x4, &(0x7f0000000140)={0x0, 0x9, 0x3, @tid=r1}, &(0x7f0000000180)) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000001300)=""/169) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x40, 0x0, 0x200, 0x5, 0xfff}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) getpgrp(r1) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000300)=""/4096) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000001480)={0x0, 0xfb, 0x110, 0x6, 0x33ef, "aef79833543a2ce59fd457359fa3a29b", "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"}, 0x110, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000013c0)={{0x7, 0x20, 0x3, 0x6, 0x81, 0x8001}, 0x3, 0x6, 0x7, 0x401, 0x800, "0d013e30808b3ada0a7f6e9106d85bb37210b19ab1dcb10ad9d8440c55fcecf21f6079d17f66cb6557b7c959f91d8ee5e5442321ffa186aa1835b5c9e73ad2784da196bd157eed0f950694a243088249f41af235e6c9b48d167250641010bf992305ce6675d6b69143f739d0dc1e7b55df9fce29852ca6cb42e03744f701256d"}) 16:30:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40200) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x3}}, 0x10) 16:30:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xf8f73f0000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:27 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000600)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x11c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1b}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffff21d}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa922}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f0000000000000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf51}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb3}]}, 0x11c}, 0x1, 0x0, 0x0, 0x1}, 0x8010) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r2, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) ioctl$NBD_DO_IT(r3, 0xab03) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000200)=0x1, 0x4) getsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000040)=0x6, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000740)=ANY=[@ANYRES16=r1], &(0x7f0000000080)=""/70, 0x2, 0x1b}, 0x0) 16:30:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x4e21, 0x80000000, @mcast2, 0x7}, 0x80) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000002c0)=0x3, &(0x7f0000000300)=0x4) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000000c0)=""/12, &(0x7f0000000100)=0xc) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000280)=0x54) eventfd2(0x100000001, 0x80000) [ 1120.445465][T12156] QAT: Invalid ioctl [ 1120.461925][T12156] QAT: Invalid ioctl 16:30:27 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1c1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x1, 0x0, 0x100000000, 0xfa, 0x3f, 0xc7}) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080), 0x4) 16:30:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') linkat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x400) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x4, 0x5, 0xd36e, 0x1, 0x1, 0x0, 0x25, "674281a18acbfb92a2291c2baafd0125722266fd", "8efdda119a0c9e25a00a9b0067301e97124730eb"}) r1 = geteuid() getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="040004000000000008000400", @ANYRES32=r8, @ANYBLOB="10000300000000002000050000000000"], 0x64, 0x2) 16:30:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = semget$private(0x0, 0x1, 0x201) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f0000000000)=""/40) 16:30:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xff0f000000000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:27 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x3ffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x7fff}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000540)=""/4096) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101002, 0x0) ioctl$TIOCSBRK(r3, 0x5427) 16:30:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) getcwd(&(0x7f0000000000)=""/202, 0xca) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:27 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6858c486, 0x20040) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000200)) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x976, 0x101800) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x81}, 0xf) 16:30:27 executing program 3: gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000480)='net/udp6\x00') ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x8, 0xffff, 0x1, 0x100000000, 0x4, 0x3}) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@null=' \x00', 0xf, 'ip6_vti0\x00'}) 16:30:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0xfffffffffffff000, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:27 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x800, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000140)={0x0, 0x1, [{r1, 0x0, 0xfffffffffffff000, 0x1012000}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x8000) mount$bpf(0x20000000, &(0x7f00000001c0)='.\x00', 0x0, 0xa2401, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000200)=""/76) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000080)) ioctl$VT_WAITACTIVE(r2, 0x5607) 16:30:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) setfsuid(r1) r2 = msgget(0x2, 0x200) msgrcv(r2, &(0x7f0000000540)={0x0, ""/4096}, 0x1008, 0x2, 0x1000) 16:30:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xa7, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000000c0)={r2, 0x6236, 0x80000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:27 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f000000a640)={0x0, 0x0, 0x2080}) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x2, {0xfffffffffffffff7, 0x8, 0x100000001, 0x2, 0x4}, 0x7}, 0xe) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x404, 0x9, 0xd6, 0x10001, 0x0, 0xff, 0x1}, 0x1c) 16:30:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) setsockopt(r0, 0x6, 0x1, &(0x7f00000001c0)="6a8972f288caaa08c87e4eda2bedd2a0ea7b185272841d4745c5caebc8b35a408abc2dd9f564195a4f4ba16d0abe1017145dcf95f919f666f8d6cdb0be54309c909670bcb28aa3b34f22ceb5a1375990809b1fa1ad4338a61ffd8db66bc2bf9ea7f6041bb428475586e60d32468d29920e3dbfc7e370ecba5c826c2935ed1a29191c653cbbec53b523a87d0d06cd95a50a75f896a9974c468874d690aa613243993f26beb35ad77fa54cb8830a56a20b0f84ac36a9e4cf0f0895f5aabbc28adebd9b824a404c43a8ec4ab7976281017bc939fb8d874340785de0", 0xda) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x88100, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vfio/vfio\x00', 0x200800, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000140)={0x1ff, 0x2, 0x0, 0x1, &(0x7f0000000040)=[{}, {}]}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x7fff, 0x100000000, 0x0, 0x4, 0x12, 0x4, 0x1, 0x6, 0x0, 0x9090, 0x200, 0x7}) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x100) prctl$PR_SVE_SET_VL(0x32, 0x2497c) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000600)=""/174) 16:30:27 executing program 0: lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@v1={0x2, "b53774b44b0a5627924fb6bf9b"}, 0xe, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20000, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0xfc, 0x40, 0x1, 0x2000000000000, 0x0, 0x0, 0x20, 0xd, 0x7, 0x81, 0x4, 0x6, 0xde, 0x10000, 0x8, 0x0, 0x0, 0x1280000000, 0x1, 0x7ff, 0x7b, 0x5, 0x5, 0x100000001, 0x9d15, 0xfffffffffffffff8, 0xf410, 0x7, 0x101, 0x15, 0xffffffff, 0x3, 0x9, 0x2, 0x80000000, 0x29, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x8100, 0x9, 0x10001, 0x4, 0x6, 0x40, 0x1}, r0, 0x1, 0xffffffffffffff9c, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xa, 0x0) 16:30:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x27}], 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r1, &(0x7f00000000c0)='uid_map\x00') ioctl$KDENABIO(r0, 0x4b36) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00', 0x801}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'vcan0\x00', {0x2, 0x4e22, @remote}}) 16:30:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xde7, 0x10000) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:28 executing program 3: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r0, 0x0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000003c0)='net/ip6_mr_cache\x00=N\xb5\xd2\x1a\xee\xa3\xdc\xfd\x8e\x9c\xf1\xa0\x9f\xc12|\xf9.\xd1A\xbb\x03[^L\x96\xa3V\x98\x18\a\x00\x00\xb2\xc2:%G\x9d\xce\\D\xed\x1a\xd1o\xa7\x83\xc9X\x8f\xbb\xf7\x91%>\xbb_\xbe\x1e\xfd\xae\xf9~\xa5?\xa4I9n\t\x17\x01\x17\xde-\x8e\x87z\r\xd3\xb02\x99\x14\xe6\xcf\vF0\x87a3\xe6|\xb8\x18\x8e\xbb\xb8\xd7\xec\xa1\xc8\xc9#*\xee\xee\x96\b\x00\x00\x1cU\xe5`-P\x84\xaf\x8d6b\xdf\xee\n\x98\x8f\xdc]Q0x0}) sendto(r0, &(0x7f0000000040)="ac541c53ce6567a5a081a513c08208907161f5548bc8f3b3fd1e474731bafae376963fa451c300", 0x27, 0x24004000, &(0x7f0000000100)=@xdp={0x2c, 0x1, r1, 0x4}, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="673cba6a8ed6740c41db0199e7a00da792e389f1ad421da55cd617d4bf2751b06f140d28945a74610ca8631113783199707253b351076da1899364524f78c098907e89a24fd142e7f11134c993ba374f4ba458a75861517961ab836be36200d25b544eaabe9c06a934bca992cf7bcec0663add78f8ba717fc80c2227d75bba7b2c75464b53", 0x85}, {&(0x7f00000002c0)="de0f7bba0765e7f8b62644dca251ee625e7372c71b697e994b63c3388622f6daf6eb72ded462693c915be99a6c616dfe6126f629fcdf066bb8344234e352e1dc46dd5d41200bbcadbb825e1629d855577b57b3a248e262d281ac8f47e653", 0x5e}, {&(0x7f0000000340)="fce0731c21f475eb03", 0x9}, {&(0x7f00000003c0)="ac91612a54ebf1b68313be91dbf80e793517659a", 0x14}], 0x5, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x100, 0x117, 0x2, 0xec, "9e896da590164396e5f583059389ad94533dd6bd4ae1fbe07e7a8350b0c10cf7aa47cef2f4aeaf35df56066a8a8b5677142062c1b655ffdc2bde0cb032a4b842a0866d57979e4594e9f1fc4428b5670f931a70aa6694324f350b8c75dec1a68cc1c32c0ffb499ac0bf5b2658218826e4081794101bc1e0c565afe8903a55b6852b8f6942364b2c09aff19f85122d2d312b9276459425fe0e4a06da24f49b7e52d21d16bccfde722221940cd61d889bb1112cbb172c9a7d9519896865808156a5dfb9ce9dca3098ac5314c6d53b2a301e25b114e0d9ea8f426b75bcdca5e84129a17881d2905096bf2f59169b"}, @assoc={0x18, 0x117, 0x4, 0xfffffffffffffffe}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x148, 0x20040010}, 0x20000080) 16:30:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x23, 0x0) 16:30:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000080)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8a, 0x10000) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000240)=""/174) 16:30:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x10000, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x8001) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x100000001}, 0x28, 0x1) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xffffffffffffff80, 0x100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000}) r4 = creat(&(0x7f0000000180)='./file1\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000001c0)={r3, 0x80000, r4}) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) gettid() 16:30:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x2011, r0, 0x0) 16:30:28 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x103000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000600)=0x2, &(0x7f0000000640)=0x4) r2 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) sendmsg$can_raw(r2, &(0x7f0000000580)={&(0x7f0000000340)={0x1d, r3}, 0x10, &(0x7f0000000540)={&(0x7f00000004c0)=@canfd={{0x3, 0x2fd, 0x8000, 0x7fffffff}, 0xc, 0x2, 0x0, 0x0, "7a0144b0df2a95a0beadf7965170e725478a7c1874f985472cfc7c5af25ff7a9071ff84ff4c01b6f1dee520447c1499dc2fbf4c209a69c6561d0224765dbd63a"}, 0x48}, 0x1, 0x0, 0x0, 0x8080}, 0x8090) getsockopt$ax25_int(r2, 0x101, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x30, r4, 0x8, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7ff, 0x5, 0xa16e, 0x5}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40800}, 0x40) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x108, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x100000001}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000040)={0x1, 0x1}) 16:30:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file1\x00', 0xc6) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x2b, 0x0) 16:30:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x8a80, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1122.170128][T13550] EXT4-fs: 4 callbacks suppressed [ 1122.170140][T13550] EXT4-fs (sda1): re-mounted. Opts: 16:30:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x480, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x20, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:28 executing program 1: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = gettid() fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x0, 0x4, 0x1f, 0x7ff, r1}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x1, 0x2001f, r2, 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)=""/162, 0xfdca) 16:30:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000880)=[{&(0x7f0000000040)=""/155, 0x9b}, {&(0x7f0000000100)=""/38, 0x26}, {&(0x7f0000000140)=""/103, 0x67}, {&(0x7f0000000280)=""/65, 0x41}, {&(0x7f00000003c0)=""/136, 0x88}, {&(0x7f0000000480)=""/224, 0xe0}, {&(0x7f0000000940)=""/210, 0xd2}, {&(0x7f0000000300)=""/60, 0x3c}, {&(0x7f0000000680)=""/255, 0xff}, {&(0x7f0000000780)=""/224, 0xe0}], 0xa, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x6, 0x6, 0x4, 0x200}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x8}, 0x8) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x40b, 0x101000) 16:30:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0xffff, 0x0, 0x2, 0xc649}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000180)={r2, 0x7fffffff}) 16:30:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x2d, 0x0) 16:30:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x294500, 0x100) ioctl$VT_WAITACTIVE(r2, 0x5607) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:30:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ip6tnl0\x00', 0x1ff}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xf8, 0x5, {"39ed2322ce1aa51caabbac6fd7c55543eb2deaa1da35d85e2ae72833a0fb8b93e1606536d88f1f0a73af604e817453e670ec2e876c0ed114bc2531355c8923c8207ce9cbd28e7abc29ee961620bf7a369875f47ea8f6e534f10ff96a93f21e948bf3a4c5f43fa2788ccf34dc05a5e77c615f50472e48da6bc3e7f4598bd2ca3dc94ad4ce48cfc57b7b80dea4e5973cda23894358be62dc3fa87323c8fa4e760b76d58c555c1b24b2d73d8a3ff7c867c0d0c06edaf5b2faa26358a75419189f9564c2bf53a42c95a0e8bb0ee63488b8c0184445cf3deadf1247b3425d748487"}}, {0x0, "a9c77247000ac1352e6288183b0e8cf6bb90f2f6e5529535c7238c85a3ee894318ec23f4db1b215f38b14250638df72cae20b8cd620c97efef84b0996e43792688e9d6a3067184ff354ab9e74bb9bf1f784565cfa328039acf2d9cd0c18f4b84f364b8a0c23ceb99b8916c2ac57355d5556b588dc2d5a7dd754daa3cf1641d59375a7b5f6fec7823f7ca5421cf9fdf561f31"}}, &(0x7f0000000000)=""/5, 0x18c, 0x5, 0x1}, 0x20) ioctl$void(r1, 0xc0045878) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000240)=""/174) 16:30:28 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x103882, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='\x03\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0xfff, 0x2, 0x6, 0x7ff}, 0x10) [ 1122.382615][T13872] EXT4-fs (sda1): re-mounted. Opts: 16:30:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 1122.575331][T13883] QAT: Invalid ioctl [ 1122.590493][T13883] QAT: Invalid ioctl [ 1122.654777][T13889] EXT4-fs (sda1): re-mounted. Opts: 16:30:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x7, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) 16:30:29 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x2) [ 1122.732628][T14038] EXT4-fs (sda1): re-mounted. Opts: 16:30:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x810, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) r1 = getpid() ptrace$getsig(0x4202, r1, 0xffff, &(0x7f0000000180)) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x30, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) 16:30:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0xc4200, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8080, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x20001, 0x0) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000040)=""/174) 16:30:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) 16:30:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000080)=0x80, 0x4) 16:30:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000180)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) 16:30:29 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x40000) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x9, 0x1) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', r2}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x8, 0x30, 0x6, 0x2}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x8}, 0x8) 16:30:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000003c0)={r0, r0, 0x2, 0x7a, &(0x7f0000000280)="f9c1c1d55f262f7b65ad300413594076c000a661625a1fa438f1a476139b2f340f239d33146845c54de66189e89d59448f23af33e548b93e874c90f39e47b1824ccc771fc0c40f6a8b5d9a0fe7b64d9429009c6b347065e9ba8614427621eb896173b34ac223d3ca239abe9c71fc5e8def2ac0aa627c21d55c2d", 0x5, 0xa, 0x6, 0x1, 0x8, 0x1, 0x80000001, 'syz0\x00'}) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000600)=""/172, 0x12}], 0x10000000000001cb, 0xfffffffffffffffe) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x90000, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000100)) 16:30:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x130, 0x0) [ 1123.039308][T14369] EXT4-fs (sda1): re-mounted. Opts: 16:30:29 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000000000000000000000000000000"]) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x100000000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'gretap0\x00', @broadcast}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000300)) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x8, 0x4081fd) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) 16:30:29 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@generic={0x2, 0x9, 0xf95e}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) fcntl$setflags(r2, 0x2, 0x1) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) [ 1123.135176][T14471] EXT4-fs (sda1): re-mounted. Opts: 16:30:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x800, 0xffffffff, 0x0, 0x2}, 0x8) 16:30:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000300)=0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x8001, 0x3, 0x101, 0x1, 0x0}, &(0x7f0000000180)=0x10) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x8000, 0x8000000000000, 0x401, 0x80000000, 0x8, 0x9a6, 0x0, {r2, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x401, 0x551, 0x0, 0x215f}}, &(0x7f0000000280)=0xb0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000002c0)={0x0, {0x9e7}}) 16:30:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x101) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000100)="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") syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 1123.166218][T14520] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x4f, 0x2, 0x7fff, "caaf70354359f6899e458f3628fc5556", "b23b8126181f11f737c00273406bd8920533e51e789c941448a40bc404a43088e5b1418a2ad495fa05a8f176ba02f3a03c6d5c31f6634f7e71f8"}, 0x4f, 0x3) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r1, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x1}}, 0x18) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0xe7a9}, 0x15a) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 16:30:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x800, 0x0) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000140)=""/174) 16:30:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r1}) 16:30:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0x1, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x5) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 1123.460742][T14731] EXT4-fs (sda1): re-mounted. Opts: [ 1123.476199][T14738] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000300)=0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x8001, 0x3, 0x101, 0x1, 0x0}, &(0x7f0000000180)=0x10) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x8000, 0x8000000000000, 0x401, 0x80000000, 0x8, 0x9a6, 0x0, {r2, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x401, 0x551, 0x0, 0x215f}}, &(0x7f0000000280)=0xb0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000002c0)={0x0, {0x9e7}}) 16:30:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:30 executing program 1: mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x81, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)={0x47, ""/71}) 16:30:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x4f, 0xff, 0x80000001, 0x2, 0x80}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x106) [ 1123.730690][T14968] EXT4-fs (sda1): re-mounted. Opts: 16:30:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x100}, 0x28, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 16:30:30 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @rose, 0x1, @netrom}, &(0x7f0000000100)=0x1c, 0x80800) connect(r1, &(0x7f0000000200)=@llc={0x1a, 0x32f, 0x0, 0x4, 0x8, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000000)) getsockname(r1, &(0x7f0000000280)=@nfc_llcp, &(0x7f0000000140)=0x80) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video35\x00', 0x2, 0x0) 16:30:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6000000, 0x6, 0x8001, 0xffff}, {0x9, 0x2, 0x7fffffff, 0xe469}, {0x0, 0x2a1, 0x5, 0x60f32d59}]}, 0x10) 16:30:30 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x24) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x400000) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xfffffffeffffffff, 0x8000) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000b00)={0x7, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x7, 0x20, 0xfffffffffffffffc, 0x2}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x6}, &(0x7f0000000200)=0x8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = geteuid() ioctl$SIOCRSACCEPT(r1, 0x89e3) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000b40)) fchownat(r1, &(0x7f0000000240)='./file0\x00', r3, r4, 0x400) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x2000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000000807000070010000700100007001000020050000c8030000380600003806000038060000380600003806000005000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028017001000000000000000000000000000000000000000000000000380071756f74610000000000000000000000000000000000000000000000000001000000000000002a00000000000000b07e000000000000280069636d7036000000000000000000000000000000000000000000000000000031510000000000480052454449524543540000000000000000000000000000000000000000000009000000fe8000000000000000000000000000bbac1414bb0000000000000000000000000100050000000000000000000000000000000000fe880000000000000000000000000001ffffffffffffffffffffff00ffffffff00000000ffffff00ffffffff000000ff000000000000000000000000000000007465716c30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006b00ff02000000000000000000000000000000003002580200000000000000000000000000000000000000000000000038017274000000000000000000000000000000000000000000000000000000002d0f00000800000002000000d50d000031020000ff020000000000000000000000000001ff020000000000000000000000000001fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000bb00000000000000000000ffffe0000002fe8000000000000000000000000000aafe8000000000000000000000000000bbff0100000000000000000000000000010000000000000000000000000000000100000000000000000000000000000000fe880000000000000000000000000001ff020000000000000000000000000001ff0100000000000000000000000000010100000030006c3274700000000000000000000000000000000000000000000000000000020000000100000002010f000000000028004e4651554555450000000000000000000000000000000000000000000001ff0fae0b00000000fe8000000000000000000000000000aaff010000000000000000000000000001ffffff00ffffffff0000000000000000318c9032ffffff00000000ffff000000677265300000000000000000000000007465716c300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000003c007f0420000000000000000000000000000000200158010000000000000000000000000000000000000000000000003000667261670000000000000000000000000000000000000000000000000000010000000900000000100000020100002800686c0000000000000000000000000000000000000000000000000000000003050000000000003800534554000000000000000000000000000000000000000000000000000003090001ca030009faff00020703000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000034000000000000028004e465155455545000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x768) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:30 executing program 0 (fault-call:3 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000300)=0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x8001, 0x3, 0x101, 0x1, 0x0}, &(0x7f0000000180)=0x10) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x8000, 0x8000000000000, 0x401, 0x80000000, 0x8, 0x9a6, 0x0, {r2, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x401, 0x551, 0x0, 0x215f}}, &(0x7f0000000280)=0xb0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000002c0)={0x0, {0x9e7}}) 16:30:30 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000280)={{0x7, 0xb7000000000}, 'port1\x00', 0x20, 0x800, 0x7fffffff, 0x9, 0xf60, 0x100000000, 0x7, 0x0, 0x4, 0x5}) fcntl$getflags(r1, 0xb) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x10000, 0xb, 0x4, 0x70400, {0x0, 0x2710}, {0x4, 0x1, 0xb252, 0x9, 0x8, 0x800, "a552cfc8"}, 0x9, 0x4, @planes=&(0x7f0000000100)={0x7ff, 0x6, @mem_offset=0x101}, 0x4}) 16:30:30 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x448000, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x10, r0, 0x0) 16:30:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) getdents64(r1, &(0x7f0000000540)=""/4096, 0x1000) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001740)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="2983", 0x2, 0x7fff}, {&(0x7f0000000140)="32d35435a0d896355598959cadbfa08c3b17af0599415800d32fc3a08fae456463dc24f13da9a777d2811dda70681428b7b6800f44a5ee157fb41989ae1c19efa1341bc6aa7543790f", 0x49, 0x10001}], 0x2002000, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xfffffffffffffc01, 0x200, 0x7, 0xfffffffffffffffd, 0x46a0}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e24, 0x8, @local, 0x42}}, 0x401, 0x7}, &(0x7f0000000180)=0x90) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:30 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:30:31 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x20, 0x2) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x201f, r1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3ff, 0x4040) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0xa, 0x2}, 0x14) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000080)) 16:30:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'v\x00\x80\x00', 0x4}) 16:30:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x2, &(0x7f0000000240)=""/174) 16:30:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x42000, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x80}}], [{@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r0}}, {@fowner_lt={'fowner<', r1}}, {@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x38, 0x36, 0x36, 0x39, 0x35, 0x38], 0x2d, [0x7d, 0x34, 0x76, 0x32], 0x2d, [0x39, 0x7f, 0x7b, 0x65], 0x2d, [0x77, 0x76, 0x37, 0x34], 0x2d, [0x67, 0x77, 0x0, 0x66, 0x31, 0x37, 0x32, 0x66]}}}, {@smackfsdef={'smackfsdef', 0x3d, 'cpuset'}}, {@smackfsdef={'smackfsdef'}}, {@euid_gt={'euid>', r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'userGPL-'}}]}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:30:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x7, "57356caca49e6a38173fedec82e13ecaeba7961cc064d4592f503883951de573", 0x4, 0x3800000, 0x3, 0x0, 0x4}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 16:30:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x5421, &(0x7f0000000240)=""/174) 16:30:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x2, &(0x7f0000000240)=""/174) 16:30:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000100)=""/170) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x11, 0x0, &(0x7f0000000040)="c120ccf096d9287185a1e50f1a214a88b5c95b52b5f708d0df36cd813a0262ebf24a8d4766a407516405307218da26504f934852654da03a0a3f388ba274b16abdabd45d1ad93bb510b93a8b111fde164345e32f7ca39fd309c7918aafdbdd6073b854b5368cf49c1f43b7211e3f8c70f9de2f940f5a69a77410fb0e58b633a6a6df5e72ffd16171ecde0bc43033eab540e38c9483185a08adb44f6e4a0a7c2a958058ba655e30e3d4", &(0x7f00000003c0)="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", 0xa9, 0x1000}) 16:30:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x400, 0x103) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0x200, 0x8, 0xffffffffffffffff, 0x5, 0x0, 0x1, 0x4010, 0x3, 0x3ff, 0x4, 0x100, 0x3, 0x3, 0x96, 0x7476, 0x8a, 0x800, 0x20, 0x0, 0x9, 0x1, 0x7, 0x9, 0x800, 0x8f0, 0xf58, 0xd, 0x400, 0x4, 0x731, 0x3ff, 0x8, 0x6, 0x1000, 0x100, 0x1f, 0x0, 0x8, 0x5, @perf_bp={&(0x7f0000000180), 0x9}, 0x10, 0x0, 0x5, 0x9, 0x3, 0x20, 0x4}, r1, 0x7, r1, 0x8) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x5450, &(0x7f0000000240)=""/174) 16:30:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:31 executing program 3: getresuid(&(0x7f0000000340)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000640)=0xe8) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x7fffffff, 0x3, &(0x7f0000000440)=[{&(0x7f00000000c0)="422af2e7c190921ea363af07140db10d42fd2e79611d3eb3e128d98ef1507342b219c8e3e7b9c0e8ec4b30570b8722af82dfa453f8f28dc228e8e934ea8e29f84f9cbf832910344938e9b352e97f65a27566c2cc673e480dbc147c5d2f59f9c9ed400bf839c1de53054bfc6963ff6d6dce03fa261eddf3bfe2a2800e28edacc7ba054913f41e9c9a2647e88aecbdc02b8ef3c5438488bd2ff82531f4877fe5bec8b00015adb7cf031554483cadcae3da6f4c5bc20ecf28f8bac99e08b1f3eb7e827262c7cc6732b82f288b6ff47dba2d", 0xd0, 0x3}, {&(0x7f0000000280)="ec36c5a656c7434c3da3c49ae4b5a3e4d59f55bec39cf72beb4edda9f13fa531ab19bf2932e74280c919adbaea52e385448d00dd28367092f6fd3bdf6c91074360cb3756a0924e0564c3f04b4100dc4786645c5f0ab9119e87ec9c732cbd413de4e42ec7d27989faa179ccabbbb101d4871604a9bf33b5ded90620187a83dc6b85f1afab0563cd01f3c9ea84ed83af4d45924b51bcc02d92f54b95791478c129af72314bc01f4a904c357ccb", 0xac, 0x3}, {&(0x7f00000003c0)="ee453e8bb559391b901b373b1cf1361af09e10c259cc4dc6f1ba25789fac5b13f6aee3baacb5516331ad49dd139f61937945239910eed8404cb2e1ee98ff8fccbdda7a", 0x43, 0x6}], 0x800000, &(0x7f0000000680)={[{@file_umask={'file_umask', 0x3d, 0x6}}, {@file_umask={'file_umask', 0x3d, 0x1f}}, {@uid={'uid', 0x3d, r0}}], [{@euid_lt={'euid<', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')posix_acl_accessppp1*wlan1'}}, {@fsname={'fsname', 0x3d, 'net/ip6_mr_cache\x00'}}]}) io_setup(0xffffffff, &(0x7f0000000740)=0x0) syz_open_dev$adsp(&(0x7f0000000980)='/dev/adsp#\x00', 0x45, 0x40) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000009c0)='projid_map\x00') r4 = accept$alg(r3, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='cgroup.events\x00', 0x0, 0x0) io_cancel(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x3294dc04, r4, &(0x7f0000000780)="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", 0xfa, 0x1, 0x0, 0x0, r5}, &(0x7f0000000900)) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000940)={0x0, 0x3, 0x9, 0x1}) preadv(r6, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5421, &(0x7f0000000240)=""/174) 16:30:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000000c0)={r2, &(0x7f0000000140)=""/173}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x5451, &(0x7f0000000240)=""/174) [ 1125.248227][T16144] hfs: unable to parse mount options 16:30:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) [ 1125.329679][T16167] hfs: unable to parse mount options 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) sendto$unix(r0, &(0x7f00000000c0)="0845b317a7129431549ad2d02f6f71d52c99d7a34937", 0x16, 0x0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00') getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000180), &(0x7f0000000280)=0x4) [ 1125.447041][T16358] QAT: Invalid ioctl 16:30:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x5452, &(0x7f0000000240)=""/174) 16:30:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5450, &(0x7f0000000240)=""/174) 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') write$binfmt_aout(r0, &(0x7f00000003c0)={{0x10b, 0x2a0bc926, 0xffffffffffffffe1, 0x32c, 0x318, 0x7, 0x8, 0x1}, "13f0446567909a499b4ef802ee953e5b956309bf637114bf6f5abb5c12b0a954d4f259ca9bee97e58ce79ead144db826193c9ab3fb2760b55597b82bcb89", [[], [], [], [], [], [], []]}, 0x75e) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x4, 0x8001) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x100, 0x0) 16:30:32 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x200, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(r1, r2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x2, "60c9c176c60f4a1d"}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc0104307, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x5460, &(0x7f0000000240)=""/174) 16:30:32 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x0) write$P9_RLERROR(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="160000000702000100626f6e765f736c61766500"], 0x16) getsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000540)=""/200, &(0x7f0000000400)=0xc8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000640)=""/153, &(0x7f0000000700)=0x99) r2 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x13, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000780)={0x0}) r4 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000880)={0x0}) r6 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x10, r0, 0xc) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000c40)={0x124, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b631040", @ANYRES64=r2, @ANYBLOB="040000000000000012634840040000000000000004000000000000000000000001000000000000000000000050000000000000000800000000000000", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="852a687700010000", @ANYRES64=r3, @ANYBLOB="03000000000000008561646600000000090000000000000000000000000000001000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000400000000000000"], @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB='h\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="02000000000000000b63000003630840", @ANYRES64=r4, @ANYBLOB="046304400100000011634840030000000000000001000000000000000000000010000000000000000000000030000000000000000800000000000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a687301000000", @ANYRES64=r5, @ANYBLOB="0300000000000000"], @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000"], @ANYBLOB="070000000000000003630840", @ANYRES64=r6, @ANYBLOB="0f630c4002000000010000000000000000634040040000000000000001000000000000000000000011000000000000000000000040000000000000004000000000000000", @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000400000000000000852a747000000000", @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000003f00000000000000"], @ANYPTR=&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000004000000000000000300000000000000018000000000000002800000000000000400000000000000020000000000000007800000000000000"]], 0xef, 0x0, &(0x7f0000000b40)="725c73389f586e217161dd972a79651e8b6838b26255062f0c6df50a964ebe40b64415e84aa6cc146069e395cf475112b3434445c82b2af4bbbfc7dbd1ff12df82133818f8c828645e12c82faa996e6f2ef3da671fbc504ceb4b971577172b3babde3dc43cf7e582b573d7321b0be4930e8ec9860b1490d00189e6bc54c767cd02dd3309ad6fa6d1805871a41478eed53f8f21d7d094eca10c42bd0174976c1b16edb295819749093bc4c8d9ecdee976a811af71fcb424792c91a63dde5ac70a5b78dd9cfa609a18305450c50a237301e9a775b88bb4703095880be5dee53892522a36bdc62dfba453be9781a1f541"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) close(r0) r8 = accept$ax25(0xffffffffffffff9c, &(0x7f0000000140)={{0x3, @default}, [@rose, @remote, @netrom, @bcast, @default, @netrom, @bcast, @default]}, &(0x7f00000001c0)=0x48) r9 = syz_open_procfs(r7, &(0x7f0000000300)='net/hci\x00') ioctl$EVIOCGREP(r9, 0x80084503, &(0x7f0000000340)=""/120) getsockopt$TIPC_SRC_DROPPABLE(r9, 0x10f, 0x80, &(0x7f0000000c80), &(0x7f0000000cc0)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r8, 0x891a, &(0x7f0000000200)={'bond_slave_1\x00', {0x2, 0x4e20, @multicast2}}) fchmod(r9, 0x180) r10 = gettid() kcmp(r7, r10, 0x7, r1, r1) r11 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x400) ioctl$CAPI_SET_FLAGS(r11, 0x80044324, &(0x7f00000000c0)) 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1, 0x0) 16:30:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5451, &(0x7f0000000240)=""/174) 16:30:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getpeername(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000100)=0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:32 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x1, 0x1, 0x35, 0x3, 0x2}, 0x2, 0xfff, 0x2}) 16:30:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4004743b, &(0x7f0000000240)=""/174) 16:30:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x317, 0x0) 16:30:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xef3) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:32 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xa000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x2}) 16:30:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000240)=""/174) 16:30:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5452, &(0x7f0000000240)=""/174) 16:30:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/56) sendto$inet6(r0, &(0x7f0000000080)="21e809162c8081a5924d9cbf366a2982f68277de70506fb1af3fdf3f207073d97e81397300e1358f4207e347c367fde0e07ff17b0d4f0fccae7ea82be04e91f20d7834a0dbd27d90c0e8a2893d90b9ccd5be7cf825390b11bfc35c48916a47", 0x5f, 0x24004844, 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 16:30:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047440, &(0x7f0000000240)=""/174) 16:30:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000300)=""/180, 0xfffffffffffffffe) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:33 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x7, 0x2) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "b07905997a27653b582b"}, 0xb, 0x3) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) 16:30:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8000, 0x0) 16:30:33 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rpc\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0xfffffffffffffcd8}], 0x1, 0x0) 16:30:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x5460, &(0x7f0000000240)=""/174) 16:30:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x800) preadv(r0, &(0x7f0000001740)=[{&(0x7f0000001640)=""/5, 0x5}, {&(0x7f0000000200)=""/155, 0x9b}], 0x2, 0x0) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/192, 0x2ff}, {&(0x7f0000001840)=""/235, 0xeb}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/248, 0xffffffffffffffb8}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000001780)=""/179, 0xff74}], 0x7) 16:30:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$KDDISABIO(r0, 0x4b37) write$FUSE_WRITE(r0, &(0x7f00000006c0)={0x18, 0xffffffffffffffda, 0x4, {0x4}}, 0x18) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/80, 0x50}, {&(0x7f00000000c0)=""/179, 0xb3}, {&(0x7f0000000280)=""/153, 0x99}], 0x3}, 0xf7}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/149, 0x95}], 0x1, &(0x7f0000000480)}, 0x10001}], 0x2, 0x0, &(0x7f0000000540)={0x0, 0x989680}) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)={0x0}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000700)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x75, 0x2, 0x1, "3af17116e97b435aaff6dbf5bc98b2b0", "ece27ba9a451c8e04afc7566cf4ad4f0d11b6f575582a733df5702364cbb8f133c6a64f5161576f39df583f985df7aaf5a659c04908680227a8193814aa9610aa6bf8c139597451afbf34614f18e4372be7cc32a9f110ce4bff6895085732dbc"}, 0x75, 0x1) mkdir(&(0x7f0000000680)='./file0\x00', 0x48) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000640)={r1, &(0x7f0000000580)=""/138}) 16:30:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="02002dbd7000ffdbdf2508000000080004000600000014000200080007000008000008000900010000001800020014000100ff0200000000000000000000000000014800030014000200766c616e30000000000000000000000008000800ff0000000800010002000000080007004e2100000800080001000000080007004e21000008000100000000000800040000010000080004000800000048000100080001000a0000000800050000000000080008008000000014000300fe80000000000000000000000000000f080005000400000008000b00736970000800080003000000"], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0x400c0) 16:30:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$isdn(0x22, 0x3, 0x25) lsetxattr$security_selinux(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:xen_device_t:s0\x00', 0x22, 0x1) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xe20, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) splice(r0, &(0x7f0000000040), r1, &(0x7f0000000080), 0x0, 0x7) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x0, 0x1000002015, r0, 0xfffffffffffffffc) 16:30:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047452, &(0x7f0000000240)=""/174) 16:30:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743b, &(0x7f0000000240)=""/174) 16:30:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) keyctl$session_to_parent(0x12) 16:30:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x3, 0x6, 0xa0000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x1f}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000200)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt(r2, 0x8, 0x3, &(0x7f0000000100)="21f280ff597117e1325c170e1a8247a840da4022fa863c67c52a1f6e0d4b03a8d9698edb67ee9921293c9a9ae77aa37b215863abce7347cc525bb01a026a5d07f359e9fb5f937030a3bd620bfc02ebaa02fffd9ea1a9f20a2bc69b7e3ad6f2d07d", 0x61) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:33 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x11, 0x103000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x39ef, 0x8000}, 0x1, 0xfffffffffffffffd, 0x4, {0x1ff, 0x2}, 0x841, 0x7}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x8000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000040)=""/174) 16:30:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/172, 0xffd8}], 0x1, 0x0) 16:30:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) 16:30:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000240)=""/174) [ 1127.292915][T17954] EXT4-fs: 8 callbacks suppressed [ 1127.292926][T17954] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000000c0), 0xffffffffffffff10, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000080)=0x8000) ioperm(0x7, 0xffffffff00000000, 0x1ff) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000000c0)=0x7, 0x4) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x7ff, 0x9, 0x2, 0x1ff, 0x5, 0x9}}, 0x8) 16:30:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000080)={0x0, 0x4, 0x100000000, &(0x7f0000000040)=0x2}) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:34 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) socket$xdp(0x2c, 0x3, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xcf1, 0x101000) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x17, 0x65, &(0x7f0000000180)="40a7a05c81d2bb57ab75d6b47c3a48d50428e6c2818d2fd7785ab14964f526669956cdc5db06b01e436b07f25ae3ee18625b8ba0c59ccbc946b6a241002de6156674a84b69f97103f7c05203867ac117b989cdc98dc8c5596ef594e1bc8204656f1dbab8ea"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)={r1, 0x80000, r0}) 16:30:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x1f39, 0x7f, 0x3, 0x0, 0x0, [{r0, 0x0, 0x5}, {r1, 0x0, 0x81}, {r1, 0x0, 0x4}]}) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000000c0)=0x1) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40049409, &(0x7f0000000240)=""/174) 16:30:34 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x440000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1, 'z'}, &(0x7f00000000c0)=0x9) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @remote}}, 0x9, 0x7, 0x10000, 0x80000000000, 0x8}, 0x98) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047440, &(0x7f0000000240)=""/174) 16:30:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f0000000240)=""/174) 16:30:34 executing program 3: getpgid(0x0) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/anycast6\x00') preadv(r1, &(0x7f0000000380), 0x80, 0x0) 16:30:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a63c32e, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x1ff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'netdevsim0\x00', 0x1}, 0x18) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x8010, r0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080)=0x1ff, 0x4) 16:30:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1000, 0x200800) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x80000000, 0x800) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40) 16:30:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x297, 0x1, 0x4, 0x80000000, 0xcb, 0x3}) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1127.927554][T18565] IPVS: Unknown mcast interface: netdevsim0 [ 1127.949886][T18565] IPVS: Unknown mcast interface: netdevsim0 16:30:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:30:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:34 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2a0042, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x2, 0x0) renameat(r2, &(0x7f0000000100)='./file0\x00', r3, &(0x7f0000000240)='./file0\x00') r4 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x2, 0xffbffffffffffffc) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f0000000080)=0x3) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) [ 1128.092648][T18640] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2002, 0x0) 16:30:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000040)=""/82, 0x52}, {&(0x7f00000000c0)=""/208, 0xd0}, {&(0x7f0000000280)=""/55, 0x37}, {&(0x7f00000002c0)=""/57, 0x39}, {&(0x7f00000003c0)=""/203, 0xcb}, {&(0x7f00000004c0)=""/147, 0x93}, {&(0x7f0000000300)=""/73, 0x49}, {&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000640)}], 0x9, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000640)={0xffffffff, 0x3}) 16:30:34 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0x0, 0x5, {0xffffffffffffc19a}}, 0x18) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x5, 0x10}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x5}, 0x8) statx(r1, &(0x7f0000000280)='./file0/file0\x00', 0x100, 0x8, &(0x7f0000000380)) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000002c0)={0x5, 0x7, 0x1f, "1108bc1645"}) 16:30:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000240)=""/174) 16:30:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 16:30:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x240, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) 16:30:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x4020940d, &(0x7f0000000240)=""/174) [ 1128.429294][T19019] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047452, &(0x7f0000000240)=""/174) 16:30:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:35 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/stat\x00') 16:30:35 executing program 4: r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x400, 0x20000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400) write$P9_RXATTRCREATE(r0, &(0x7f0000000200)={0x7, 0x21, 0x2}, 0x7) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00') ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000340)={0x4, 0x5, &(0x7f0000000240)="a793be2f45021255287ec39479f2e571c65ff31c51a1aef5db686753c75abd9c1fad1fa7fb200ffee5a5887a95aa6ea9e37932c7a7759348026ac8f9ded69f6d2e04e9ce1885821f89acd843b4316b24daadcd56c54481ca6d6481f20ab3139852b09496cc43cb57f7f2d97e77b4176751c051bc7ffcb993d1dc948a9e1e9d84a6adbe9c571bfc8f2f3c7ac57a8378000e98f10da63eb338504cc8fd7a0bc9c7b09ee28e999e9c1f90b8c532bb780bb5397e9874f2074c8770dc74e0894029743551e8a5f9", {0x400, 0x7fff, 0x32525942, 0x5, 0x0, 0x5, 0x7, 0x5}}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x8c, r2, 0xa00, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xecc5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x801}, 0x4000080) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30, 0x0) link(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000380)='./file0/../file0\x00') 16:30:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000240)=""/174) 16:30:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x80000, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000380), 0x4) socket$caif_stream(0x25, 0x1, 0x2) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) ioctl$void(r0, 0x0) 16:30:35 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x10) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100)=0x34, &(0x7f0000000180)=0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) [ 1128.799137][T19340] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffee2, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x100, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4008000) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000140)=[0x4, 0x9]) getpeername$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) write$P9_RWRITE(r1, &(0x7f0000000200)={0xb, 0x77, 0x2, 0x5e0c}, 0xb) 16:30:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 16:30:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200001, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x3000, 0x228, &(0x7f0000000100)) 16:30:35 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$P9_ROPEN(r0, &(0x7f00000002c0)={0x18, 0x71, 0x2, {{0x10, 0x0, 0x1}, 0x9}}, 0x18) r1 = getpgid(0xffffffffffffffff) tkill(r1, 0x2f) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0xa0002, 0x0) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000280)=0x7) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000000)=0xccc212fb19308092) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000300)={0x2, 0x0, 0x6, 'queue0\x00'}) r5 = syz_open_procfs(r3, &(0x7f0000000180)='net/fib_trie\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000080)={0xbb0000, 0x4, 0x8, [], &(0x7f0000000040)={0x990a6c, 0x5b7e, [], @ptr=0x4}}) preadv(r5, &(0x7f0000000040), 0x0, 0x0) 16:30:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000400)="8c90f0a98792856a380100000000000000a0b91bf069d074bfed0701d45b9bc54d74cbf5ace455dd482349a8e1adc9", 0x2f}, {&(0x7f0000000440)="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", 0x1000}], 0x2, &(0x7f0000001480)=[{0x70, 0x117, 0x7, "ad79a94129fcd2a1db63038cf3ea4832f95c0196fbd79611842dd0a2054762773880f896718daf0b46f89576ced1bc7b5b8e94a05269e51f205b751edb32cf608b64658330380241d6a4b01c189a7d6ba53f5858073415bb0b893a5c"}, {0x28, 0x11b, 0x1f, "76b0322a4bdf4e2ef2f4fb93209cf563b5c2c324"}, {0x98, 0x18c, 0x0, "6cd7f011ec60fc9e1d1497c6e91c9fe8559b3c500d9d265ee598a18770ea620e45c44339d57504f9e8d835626d037efb8c4d6810a1fc244356337b6b09e356329f3ce512b3bdeb13864206230428ba736fd7688a6a8674f1ee29c91c7e76af1cfddc945bd62ff813bf101b0ede5d033ecf0ba41f079ceb2831658238ef03780d53867637c1ef"}, {0x108, 0x10e, 0x7ff, "13d0eb0ceece2eef6166e81dcd0368a221ebaaf641e798029a77070bb7a3c7bd7977bb44eafa6e5e1a081ea32d910fcb47446047d68a9b3682cd3e8f0d6ecc4f7a8abf7302cce64d3163987e59ed7cc617788ceddf8f480612d33dfebc3ef37de6ca801955a0719ec52599091a4b03121c13149ee4add938282c501f465a12ec99c50881bafc15859cb65d09c0cdb1ce68a6d061983ea4dbc75c1e844b580813011932933fc78bdfc76e058df69ca21bae2ed87541e9db42d61d6fa21bd741d4f55f386ce6e8857e0ee1fd199930a581a5b2a3b92e7c8ddd28e2a2aac530d8a5dea18a8c434255cfb54a1156ce19f3c036"}, {0xf8, 0x0, 0x4, "f169a60649812304d6bde56663547b912f2888c4bf25ddd951f9300dbf7abedee746cbf42f0c1e000474db271dff5899343855eed478b09a9827e95e0187aa5e15a92c50c46c78c0eea270d25d3c11e6d1ca83f7b6ff48d78c566fd962f8d25f343b84a04ff4fe9770235e6d3e544d0a69b4cc8efb6ed8755e206bbf8691bf209ab8e54c1a639e807897cf1caf1a0eccdc6c38e1d87e92d81d6089ee12d19126f0b919bda9ab7eabe4c051c1ec1ef03e0d51ae97375741f40d2d275f6480437c31c9b258c54bd2af5bf0305774b7773b01f60ef3c753c0555bd68afa7f4c672a81e5"}, {0x30, 0x110, 0x3f, "144d1344b1f08973127a53a584751c77b73db8c80de21b81046133c686"}, {0x100, 0x112, 0x41, "5c35e1efea43276d8659a34ba2985f2c498f644d43e75ad7dbf8358d0443a7888be34df91834eb422cdeb69c73076192f37f4c86c1584fe13a76add623fcb3c7fc2d68bac2e30745f83a877dd2b832e9cacf34e47a259ec8c35fbb7c023eed4371dfa98eb20bf66fd9cc55162058944b74e694ba481ad91da09adec3c849f51861a8fec84e226a5332e84d5ceada04315309524c202c6f3c443429a449a79583c0230b98c4509ac8fef22e3cca8fa2141e21c20d63cd99fe29a6dc864b15b56ae15ee64e3f9d09909ce4c75b485021e06118c9d715d3a07f1c03c533fa4ab6e1bb6e4ed542b22002d59c5fa4"}], 0xffffffffffffff59}, 0x200440c4) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40049409, &(0x7f0000000240)=""/174) 16:30:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x8004745a, &(0x7f0000000240)=""/174) [ 1129.112583][T19658] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:35 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) 16:30:35 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80, 0x0) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x0, 0x1, 0x7, 0xb, 0x0, 0x70bd2a, 0x25dfdbfb, [@sadb_x_policy={0x8, 0x12, 0x2, 0x5, 0x0, 0x6e6bb9, 0x2, {0x6, 0x32, 0x8, 0x1, 0x0, 0x7, 0x0, @in6=@ipv4={[], [], @rand_addr=0x5}, @in6=@remote}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e20}]}, 0x58}}, 0x4044000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x3f}, 0xffffffffffffffe5) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) bind$llc(r1, &(0x7f0000000080)={0x1a, 0x337, 0xfff, 0x2, 0x8001, 0x36a, @broadcast}, 0x10) 16:30:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000380)=@ax25={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)="498ae69bcda85c70547a426e8762df5379792f06833e8713d8a9dfce6661c8eca4f488987c978e9c1a940756bf3c1b07544df36cf1929fdc1996de4e8b0f76146fdb6ff67051f0601e71e055849262631dba37dd0a6d4830c59b85705f47628b6b08a7e145885cd4ab15ffbd8aa9e56538771fcbe76afa17ec881edfdd66d4d5c5e409fc509a1cbe8156e7", 0x8b}, {&(0x7f00000004c0)="cc0f784fd02fd7e96b0156022ebe8fb157e0d4d4806e71fe2f2d5c50b351c6cab5296c7c4f102c594f652690cc3b9b892228ce39a061766b3967b0134381fcd5c1", 0x41}, {&(0x7f0000000300)="332ee7fe7c4a6b36d14ef067048681caedc48007b82afc2b191e8119219ed8bbaad1eedab1f3b522265d01", 0x2b}, {&(0x7f0000000540)="607c3b4102c5b178f3665bc7bb630eac972140136cd902a3236724f63ed473cbfd9693af7c2584e5098435ace32ed4baed8949c50fc70818a9c14fcf8e5f10e4e530a21d47f73a9a64cc463ecdd6c701707c9debf242fa369608142cb931e68266b024a9c83f53ed1048c73d0da374f76b6df651ea3b6b51ce821ded2f2138db7c1965ecc330c661b13901d82d72121bcbc96fe92751c5704d342c85a369f7337ffb9ca1585a8f5f8aa652773a7593e5f20baa5fe7cc787c85a4471434c13a336a60c34cdc3f5c096b80eb1387c477c37d991d16a38620398a8900", 0xdb}, {&(0x7f0000000640)="cc1eeb92f0854637c0e7ace6fa2baedd615a8e3b2484a2ee124c5e51385102cef1134fc94b807aa642a669d6c12051edc94c013f7aa66cd184b61537aef93895b13c65ba3e77de1862aadbd3ba6c6a0b900afd490be52e28893b0c21bac85ca592afda7e4eaf42b294844578b2fb9cc05117b1f2260298fa681098c6b36d277d62118c57186b934fb34fb1d8779b8f98855ffb96b7a7e750532c96ef162e9fd68f18ecf40672e9", 0xa7}], 0x5, &(0x7f0000000780)=[{0x20, 0x107, 0x9652, "dff78f888de7a38682f73ac0"}, {0x28, 0x119, 0x100, "eeb7d8a70fa08a54fa1017b1be9c00ffed9aecef"}, {0xd0, 0x10d, 0x1, "1a2772ab892caab7d7574992895fc8795c993ca786956eb1bf44a19071a66ffbadb6456ebcc2c86eb13817e9dba48add05be352e0faa9583d11c6e9d11a3ff1cb7f75e8f9fda77d9ca0b693636125daa73159885a2a0f012a63935ca58b8abcef9bcc76899e826755a62cde0ad22aad36e9211d4eb0e8cece753856726403be27d446a6b85503d89f4a64aa76bd6b470749bb294ec3428c749735c76f48e6ed03629f932cc6b844596f2d6b7d6cfb66f026383f68e4534cc6c365db0cc9b"}, {0x78, 0x11f, 0x100000000, "3c3b2f0fbdca8dce4fb9fd71ac3ecd5563aea4f6fe9426b322364e48ecf65a43e2fe8833c51261a1e6638e9a9cc24d245533936b6ce3ebd72a54956fa6af7390f4f6f5a38c1175efdb7e38088293618c3a8b7764061670bcbf773092d6bdf64ad9f3e136400a5d"}], 0x190}, 0x8000) 16:30:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xab, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x1e) 16:30:35 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000240)=""/174) 16:30:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f0000000240)=""/174) 16:30:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000100)=""/174) 16:30:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x20, 0x4) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:36 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x80, 0x200080) getpid() syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0xa0070, r0, 0x0) 16:30:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380), 0x0, 0x0) 16:30:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) [ 1129.710652][T20194] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x201e, r0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4d1a4ae46ef0aa3f, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000040), 0xfffffffffffffffc) 16:30:36 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='\x00\x00B!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xce\xc1n\x89\x8e\xb3\x9f>cx\xbdg\x90\xb5\fI\xdb$ \x8c\x99\x9e%\xc6vT\xf9\xb1\xbf\x8ed\xab\x107Ev\xae1xx\xb6wW\x8f\x8e53%,\x91zI\x04\x86\xfa\xd94T9\'f2bt\x1c\x14\x89Xga\xb4\xa04\x14[\xd8\xca\xff\x8c\\v\x06\xd1\xc7\x80\xc7\xa5PY\xc4F0\xd3\xd3\xbd.\xa8\xbd\xfd[\x82') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)) 16:30:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8800, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='wlan0\x00', &(0x7f0000000140)='wlan1[\x00', &(0x7f0000000180)='trustedppp1cgroup+\x00', &(0x7f00000001c0)='-$]):}.\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='-\x00'], &(0x7f00000004c0)=[&(0x7f0000000300)='user[system*user\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='/&md5sum[security\xca+bdev\x00', &(0x7f0000000400)='wlan0wlan1\x00', &(0x7f0000000440)='eth0[GPL%nodev@\x00', &(0x7f0000000480)='\\wlan0\x00'], 0xd00) 16:30:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x4000000000000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = getpgid(0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0xfffffffffffffff8, 0x4) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000080)={'team0\x00', {0x2, 0x4e20, @multicast1}}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x30000, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='.\x00', 0xbb38, 0x2, &(0x7f0000000400)=[{&(0x7f0000000180)="661c24214f753bc6dd7339dcf6ba76af54ced98896555b9815400ffad7f09c23292ac673cdd009cb86010878aef0ee89d3921b909340276854e02571c0c4451a7b4adcfda05711c54e95853ed4ff265c8f8bc9eb023dfa9508feb5399dfe8f8b80e0693a32d92cbc3bc46f0d063fc726817ba54e9df0589b8c4fead46ea84d754175642ad779429115042008071c", 0x8e, 0xffff}, {&(0x7f0000000300)="fcd0cb3a663223e1ea5477368d02f670f38d972c0214af8ff0aa3ed3a9c44aada31f9aa4f7b98a39f417965ac49a32b00e3acb4cf112a7222440713c162353201df3138a708f4c7a39c01e9dc551a91d30c6b91debcf42c8af5a78e24768690555a56484e7786db0094d54db0ca7da9b0e94d3a6411ca8f8ba3fbaad6ffa262ce3725392e8facef8d4e280ac7f88a962d13588aa860165a23194ed0a95b846702ccf36e7e5c66897774cfbe704a1c32e5a480c8c660b0a68787486d44a1a8fa8be28a9cf5b312a894f3e5536d2742c9017f9d7d04404ae8a7c8be855f34e7caf55c280f950fd06ca7d62351985", 0xed, 0x7}], 0x120000, &(0x7f00000006c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x8}}, {@nojournal_checksum='nojournal_checksum'}]}) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000040)=0x5, 0x4) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000540)) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000700)=""/164) 16:30:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:30:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) pipe2(&(0x7f0000000040), 0x800) 16:30:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x290000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf38, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000040)={0xf, @vbi={0x9, 0x0, 0x9638, 0x34737f53, [0x20, 0xfffffffffffffffe], [0x7c000000, 0x5], 0x1}}) [ 1130.026530][T20478] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000000240)=""/174) 16:30:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) 16:30:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x80, &(0x7f0000008000/0x1000)=nil) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xb0000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000200)={0x2, 0x0, [], {0x0, @bt={0x6, 0x8, 0x0, 0x2, 0x9, 0xffff, 0x9, 0x5, 0x9, 0x2, 0x100, 0x0, 0x9, 0xa55, 0x0, 0x10}}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r3, 0x217a}, &(0x7f0000000100)=0x8) shmctl$IPC_RMID(r1, 0x0) 16:30:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4000) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x4, {0x6, 0x0, 0x5, 0x4}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1) 16:30:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) socket$inet(0x2, 0x8000e, 0x1000a4b0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1130.321763][T20750] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') times(&(0x7f0000000040)) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x4020940d, &(0x7f0000000240)=""/174) 16:30:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:30:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) 16:30:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000006000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000007000/0x4000)=nil, &(0x7f0000007000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000008000/0x1000)=nil, &(0x7f0000000200)="fa8c8a68aba010763ef17019b407f27424fd21edc141b458a864461f2e1497c404a48d9f9cd5a73e6e4150e5384ecd0fa010271c6d057484bb0f78ff7e1235afa46aa3d9f929f4f383efbefcd2022268b1ad3b52c88ab5056e4b2a15048eeaf69635adc8479a5ded6a6e30feea61b20c51272a4a169e9550f1b078a36179e77ab0f0b9991a5987914fb0fdeed095ccbf4aef151944c61ec0e97dc39d61d4fe98bea4f349088c2e741ef29512477ab81f464ad31eb9b8ab915006b2", 0xbb, r0}, 0x68) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/165, 0xa5}, {&(0x7f0000000280)=""/190, 0xbe}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/136, 0x88}], 0x4, 0x0) 16:30:37 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x4000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x3, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x4, @loopback, 0x4}}}, 0x84) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000000c0)={0x8, 0x1, 0x100000001, 0x0, 0x80, 0x8001}) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000200)=""/174) 16:30:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0xc020660b, &(0x7f0000000240)=""/174) [ 1130.700796][T21115] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000360000)="2400000052001f0014f9f407002c04000a002a10080001000e00000009000000f0000000", 0x24) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000080)=""/172, 0xac}], 0x0, 0x0) 16:30:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000240)=""/174) 16:30:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000200)=""/4096, &(0x7f0000000100)=0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa0000, 0x0) sendto$inet(r1, &(0x7f0000000040)="1899518ad757e502e50a51bff25af092f971850726591058e10aec3d464a9ea73db7b9eaea308f592c8837eaa6b653e5f9708c7dc747a9a201f74f3a92b22ca4ad9810002d", 0x45, 0x800, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r1, 0x0) 16:30:37 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1111c0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1130.897466][T21364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1130.966113][T21364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 16:30:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x3, 0x0) pread64(r0, &(0x7f0000000000)=""/82, 0x52, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) pipe(&(0x7f0000000400)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000001ac0)={0x0, 0x100000000, 0x30}, &(0x7f0000001b00)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000001a00)={r2, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000001b40)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001980)={r3, 0xff}, &(0x7f00000019c0)=0x8) preadv(r0, &(0x7f0000001800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000140)=""/200, 0xc8}, {&(0x7f0000000300)=""/132, 0x84}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000001540)=""/189, 0xbd}, {&(0x7f0000001600)=""/219, 0xdb}, {&(0x7f0000001700)=""/242, 0xf2}], 0x8, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:37 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/icmp\x00') ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000040)={0xb, @sdr={0x20323159, 0x276}}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x580) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x38000000000, 0x10001, 0x9, 0x0, 0x7f, 0x2100, 0x2, 0x80000000, 0xfffffffffffffffb, 0x2, 0x8, 0x5, 0x2, 0x0, 0x9, 0x7213, 0x4, 0x7, 0x7, 0xc303, 0x4, 0x500c, 0xfff, 0x200, 0xfffffffffffffffc, 0x1fd7af6d, 0xfffffffffffffffb, 0x2b, 0x3f, 0xe9e, 0x2, 0xfff, 0x664, 0x7b, 0x20, 0x0, 0x7c, 0x4, @perf_config_ext={0xd17, 0x1f}, 0x400, 0x5, 0x3, 0x8, 0x1, 0x8, 0xc5e9}, 0x0, 0x1, r0, 0x9) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000240)=""/174) 16:30:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2d050c0}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x40000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0x1000, 0x4fb7a5e0, 0x7}) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) [ 1131.135602][T21474] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:37 executing program 3: getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/ip6_mr_cache\x00') ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x0) preadv(r1, &(0x7f0000000380), 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10300, 0x0) 16:30:37 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2000, 0x0) fanotify_mark(r0, 0x2, 0x1, r1, &(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000380)='./file0\x00', 0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7ff, 0x0, 0x360, 0x63d8}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000600)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000540)=0xea) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000040)={0x2e, @remote, 0x4e21, 0x3, 'lblc\x00', 0x0, 0x1ff, 0x67}, 0x2c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8480) readlinkat(r5, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/39, 0x27) mq_unlink(&(0x7f0000000240)='wlan1cgroup\x00') mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) socket$packet(0x11, 0x3, 0x300) 16:30:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='ppp0\'%{(\'GPL[\'em0,\x15(#-\x00') mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1000000, 0x2011, r0, 0x0) 16:30:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x8000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40400, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x2, 0x8001}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000000)={0x34, 0xfffffffffffffff8, 0x7, 0x9, 0x4, 0x81}) 16:30:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8004745a, &(0x7f0000000240)=""/174) [ 1131.467024][T21791] IPVS: set_ctl: invalid protocol: 46 172.20.20.187:20001 16:30:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x400, 0x2, 0x9a15}, &(0x7f0000000080)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000003c0)={0x2, 0x5, 0x4, 0x3, 0x3, 0x6}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0xc3, 0xff, 0x8002, 0x859, 0xafb, 0x3cac, 0x8, 0x1, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r1, 0x7ff, 0x7, 0x4, 0x4, 0x7fffffff, 0x9, 0x7ff, {r2, @in6={{0xa, 0x4e21, 0xfffffffeffffffff, @local, 0x3}}, 0x10000, 0xad, 0x3, 0x80000001, 0x1e}}, &(0x7f0000000140)=0xb0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000, 0x800) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x101, 0x4) 16:30:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000740)=""/246) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x8, &(0x7f0000000400)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {}, {0x0, 0x0, 0x0, @local}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@broadcast, @in=@local, 0x4e24, 0x92, 0x4e20, 0xa1, 0xa, 0x80, 0x80, 0x0, r3, r4}, {0x10000, 0x3, 0x6, 0x80000001, 0xfffffffffffffbf4, 0x9, 0x76, 0xed7}, {0x0, 0x5, 0x100000001, 0x7fff}, 0xfffffffffffffff8, 0x6e6bba, 0x1, 0x0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x20}, 0x4d6, 0x33}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3502, 0x0, 0x1, 0x78be01e0, 0x3cf, 0x0, 0x5}}, 0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast1}, &(0x7f0000000200)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000640)={@multicast1, @multicast2}, &(0x7f0000000680)=0xc) accept4$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14, 0x800) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000940)={@local}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000009c0)={@rand_addr, @loopback, 0x0}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'vcan0\x00', r5}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@remote, 0x4e24, 0x0, 0x4e22, 0x6bb, 0xa, 0x80, 0x80, 0x5e, r6, r7}, {0xfffffffffffffff8, 0x200, 0x4, 0x1, 0x60000000, 0x9, 0x1, 0x401}, {0x0, 0x1728e00000, 0x7}, 0x7, 0x0, 0x2, 0x1, 0x2, 0x3}, {{@in=@loopback, 0x4d6, 0x3b}, 0xa, @in=@loopback, 0x3504, 0x4, 0x2, 0x3f, 0x1, 0x4, 0x6}}, 0xe8) 16:30:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7ff, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @empty, 0x9e}, @in6={0xa, 0x4e23, 0x0, @remote, 0xffffffffffffffc1}, @in6={0xa, 0x4e24, 0xff, @dev={0xfe, 0x80, [], 0x18}, 0x6}, @in6={0xa, 0x4e23, 0x9, @empty, 0x4}, @in6={0xa, 0x4e20, 0x100, @empty, 0x6}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, @in6={0xa, 0x4e20, 0xffff, @dev={0xfe, 0x80, [], 0x1d}, 0x7}, @in={0x2, 0x4e23, @remote}], 0xc8) r1 = semget(0x1, 0x0, 0x4c) lsetxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000002b00)='trusted.overlay.nlink\x00', &(0x7f00000034c0)={'U+', 0x5}, 0x28, 0x2) semctl$GETNCNT(r1, 0x0, 0xe, &(0x7f0000000200)=""/148) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="0824b0b749e41a0e97cbcb3e02a130c21ba7ef4cce430e8059c65851e402536b5bee8df8995e9ee44a7935b8c73237e3623c44e057a0e0d94d17107eae60e1176e9ac8615cea196a9152523b345d6552aea99a9b6dde4531a0d299d75b8f26faeeb0f9dbf1ed8e458bad92c4717a43a470b3aa22ec476c206b1db7d6034999a72559dec52246953eb3e2c548185c5c35c90b183a3729a7ae291feae7099726bb7e0d45c2f7366034f35511f2a19ce85e5d17f4350701ad42824ce6149b4bf179ec5fe0fd2c010fe9fac177d03e393cd723c2", 0xd2}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="42cd2e1d7ac7f9087bdc4e63f0527dd2fc2c312eceda53a42f7f422f71497d446d382962f5d7febda14487bd00277ce97addcd5f84ee98fc3d368146e553f5a811f0b510b2aeccb8af9d903d471d1ae28f61d8f72cf839364f7eff02ed3113ba606dbda4565aeed320b88dbf296122acd4e6dc4df4a343f0b36088245de8326739c1f5ff800c2d44eab7c1101dbd30fb55b030362a9e85e0f55140c3", 0x9c}, {&(0x7f0000001540)="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", 0x1000}], 0x4}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1, &(0x7f0000002540)=[{0xc8, 0x10d, 0x7f, "c3a405f022f0b8a5a7c6a1c9e45b7ee4095836023a74514d62c3693ff6fd162538de27d04cd214e3cf90af14c85a0490cbe5225b637613686cf3ace898ed00053d3f839dee12479e2b1039e8845933aef898faea82e4f7622b7448b4d6f9573d0edaf72d1d223134afbec34e2697f731db290ba166c6ee2fe9f515d35b9a13f70fcb535ec3711cac82848e66ebd19f416bf3b8267620fa268791d53357bc8d77c04a3c3e7d86a22656bbfa15b852dbeb95"}], 0xc8}, 0x800}, {{&(0x7f0000002640)=@generic={0x8, "066d3bc56fa1d07b20584d7877353f0b06fbba89eacd3a8a390a804b34af07f8bf6473a8754bbde09d2a5789eca7a52c3669c2b974a56d1eddf6a818c4cf75064b6f7ca34f12506bb864ce2736f5db18572f4a0c8f17e29d4adfbdaec92204879ff34bf31bd3b7d514dbf8bbd52fe4b6a9ba66bc9d9ae9d206d7628f3fef"}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000026c0)="2511291bc8724d319c59e079cb8c7fdb5ae1bb319ed577adff94c7e17348ba04ff2260b0ec86f55f4bc0b94a521973aa552cc79f8fbe19c7725a78056b2b6d50bcbf636934b3f5c7666fdec9a253168736f567d4e4ba899d9ea4c9d340bd768c57d73017b4736319af146ec864d9502e74753be902461480722ad82e3e5988812afd2b9f3d1b7e4e8dbb35d0f2857fb3042e44d90fe1e0df00100806df72af9c5670941bb98533aa60e16643162be614ec038f69a9939e41dfa70394e9df4fc5d36ca29d", 0xc4}, {&(0x7f00000027c0)="df746e9297feffafa0722efb81c0640bdc72873d02829cccf0ce2f17f7999d0c36ea3feecc4572927a1bb31ee112a835d2f8a82afd35a09e134297c0924c4d92d1c704bae5766077fde7280623e511dad18e3836923d6f926ffd4a9a60d9657640925b13abeacc7ebc3f7373ae12afef345648d6de82314143f72841ab6f206d2d90cc5e08d1514ec9b432d2cbd6275fdd5f536fe406e2d7b475483c0600f5f47222f7d877cbd9b7610e3bce934329bc18f0a96cacd73fd07e4b97a66f98c00962a609210a09686529e8f0ec5a88", 0xce}, {&(0x7f00000028c0)="a927ce2ddfbdd9dd76754af05b946f47cad1af4971d22bd512776abba34a5b67021c6edd036168259273a6b5c0648eb3f93183ee2ab94bc9cf6c9b4cec81a08bb981ec659e6b3b751014fe77a118b18454a7", 0x52}, {&(0x7f0000002940)="7d5655db9c6aa231", 0x8}, {&(0x7f0000002980)="6a9946e68baae63bef6771fe7e3dffbebfa04d56339f635788e705df6f43f6ab969779c031e5dc1b4df97971db4ae0010784134fe96cb99fff152d37abb822250ab4609b4ade1771d8122b49c2eea7ab0a862d8d873d98", 0x57}], 0x5}, 0x80000000}, {{&(0x7f0000002a80)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002b00)}, {&(0x7f0000002b40)="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", 0xfc}, {&(0x7f0000002c40)="49012865fe753ffcfc9ce10134ac17f4e7346dd20aa903f5", 0x18}, {&(0x7f0000002c80)="91534152b735501b96c3183f421d2af71cfe6a096edf51af8875f0078ee24eecbda6569bdf19481c28e0dd85416d54bb", 0x30}, {&(0x7f0000002cc0)="6d5c5aea306df75359aaba580fe44a259f575405c40c70cabe496dbe7bd6d248eb1e54b4e81dbb1387d3da75413cf46905378b09ffdd6a29addc2267b256950d99bd7955141d31", 0x47}, {&(0x7f0000002d40)="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", 0xfb}, {&(0x7f0000002e40)="e3cec56dc1d3641308307e0145859e28e0d3cd74fe1df12dd4d5b5572836ad07d76a3b6fb2505a61d28e47c17f7b65354d58321ea28c30656421af4a71aaf9122af7132faf38dfdd517a0fcb3ee578ea023afaec5056189e4a3801d8a8f449472beed1a9db5de1a1b87147298309f07e0fc757c76bb1868ff9d01c4375d8c13b66c84103469b2ed1c4c309d610f2a9786ba1a392714f28c5a7dfa140f2dda871d4eb710bdd713df4fa70deba6a57c4befa63d611239332d6aeb207adeae16a3504639b1197be61b305229975fecfa72edaef95fd4ed7026c48879e006dc315e172", 0xe1}, {&(0x7f0000002f40)="7c262c1379fee379d5a2280b39c69fc4f8a8a0f879b044a5861d97ec94e0fc6aab53ce06850ac911d3f86a992250238184f11ad16f621baf6e3dd9f8d29a2bdd584942908429db796399006b514529b7458598457f27432fdf3a8fed0928cd735b96f5359df02aae28dbd4a7ef4d5fc5", 0x70}, {&(0x7f0000002fc0)="799acacf24e970803be598efe83299f8e0670dbb467fc76d31d6571102d536cb646d090cefd864c76b16610d3bfbfc30a76171e005f4d4c842879a6ba07ab81d7b9aa0b00f64", 0x46}, {&(0x7f0000003040)="cf0204eb528da2ae3123d9f0ce82f0e97d0d0fabc31bdb300354178a9876a8b8d743fe6d06950e238d2ff2a938a2e3fbb3dd2435932b60baa2b404145e95b4f98924e5ab4f2b578f8544f3e5bd293b7884669eb2d8b932908b3be79430b64458bc54f5f505d895b2adf216c2e296d020f103545d6a1b40a79ed2a39a43c2d75d913e9cc6d7d845ba3b02fdd41a4dbaea831285fec9190a0b23e268ba892f8fa8e11e21d3", 0xa4}], 0xa, &(0x7f00000031c0)=[{0xa0, 0x10f, 0x5, "9c871579eac63de7b6929b433b3cbdb776b4ba2099e9584ea918cc15aa8898610fb30cee0524c6cdb61c64e47c2dcf459b11c7c4532f979ef3b4ca8b6b3e9a15c4487fafc82b6295c810bc52b0eee6f33a9aca1bd959966ff6aa6ceef4dcc7d8dec9ef55416b2cece732fc81e518ca1cd74fb7eb09a5bc94a24a7e9b9489f4b87f2e0a6a1e8d2507f4a9726881"}, {0x38, 0x116, 0xffffffff, "7eab8b1406070e1f9b2db657fb77f1fe6e2785e6c3669b0f64f6717b2415ad2d0069f551eb"}], 0xd8}, 0x5}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000032c0)="4465b59f00a44cccd5838c15eb1cccce46c93847a16aeaf1b14c273bea9dd9448e42d9036a972f2e2cb78b830124f62c8309065c3e5db23bc96e80e31a7b8e2e091a7d1cab086eb0d46e99f2c1cdb8ccc3f280a46e3ca5d5e00899353e11b3bbc8b0c4c83b5283806afb3a91653748b44af79296c77d7c98218ac4c80c49eb7517c536e4aac6fa2ca33d91bbdb46bd610085f3bfe42d8595d54099604f601fd23039c5ce555e7518ac70cdb122ee3a", 0xaf}, {&(0x7f0000003380)="a3797c485349a073e9528c21d40a2a9dae3a56ff5bf40a198c6905674f348679d5ae673c493c65e530945b24ee3d96c52ebbeff1dcabde229f1809e49d26222247185468b34f181d74a235970045b08117f48dc893ae4c82ba006cae975b3c73575ed8a388487fb2a8c2a8167d8771fbce4ca5371ee47bd532d28b16f568cad335bfc194d3a8b392563e5bbb5686b8bff19a8df5a20bf71e6475e8f21040dbfc3140fe42d98fa1d8c2f65ddc0d606a95951ae7301302671fa55f0d17576ef7caad99e2880c6d037d81385a7f4153d72d604c1ff70d257a3fac97b542da55ae8deb21ba6e0788c82b520ba6a183a517932036fa20ea3d0b8afa", 0xf9}, {&(0x7f0000003480)="b96d7c4905da79ddf6d6275f7dbcb746b40802b05d87f6a91899e5b13aaea5bcb873fdde683aa6949a70b953983c3131cae4fc9735275e5523", 0x39}, {&(0x7f00000034c0)}, {&(0x7f0000003500)="b4ba5d3340311cb0cbb9b48aa811f55a7410890d551ec8fe6d33cf2767d45fabda5394e7fbffb38817bd4b2d7a8d241ff9d49f4fe5e6bfdfd280d20c739314936a12a2051d86e253ac453e7fa88c89cd0207f3d6f1591c82272fe30caa04d2627069838721b44386826ae1c78b", 0x6d}, {&(0x7f0000003580)="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", 0xfe}, {&(0x7f0000003680)="b619059f15420b1930b664828bf02c957cddc8fdef74d46c938d60bbf196c58fb01c4ff8ef836ea4b69d9a8160e6a7f24f26b8e68f8fac04ba6acb7bcd5c3eb3d763844e7917934cdd2af4f8700bb924844ce0a06ca9d903b9c0b4b8587befe6bfd8", 0x62}, {&(0x7f0000003700)="1fbf85a25ceaeb03cd51221bec4ccbdaf3c9396a62df539a4b623453d22d5fe1661c1198bc79cf42308ad1e5e05d25567d810729896a0056b5150594aa5e8a2651393f21f58478cb5b3866fa04349dd4886571fc0ac5a314117a989dc255e138c54329ea9c857ebf5f1d39f3e25d99d0dcea4d54c41afdf616c456542af24d4bf3a3206687e6678876a3f4dfdcea994f88418de4e2cc71141b097ff4378034e7071ab7059fafd5dff714bdf79e1504529e59c8", 0xb3}, {&(0x7f00000037c0)="f2a6abea0034cbc3afbdcf46553fa001f3d08401d831b639d6da432fb4e23545270b2de9afe62517110212b6dce7c614cf", 0x31}], 0x9}, 0x10001}], 0x5, 0x20008004) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:38 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)='net/ip6_mr_cache\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) sched_getparam(r0, &(0x7f0000000000)) r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x86et/;\xa5n]\x84\xab\x95\x83ip6_mr_c0\xae\x99IS') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/172, 0xac}], 0x1, 0x0) 16:30:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) wait4(r1, &(0x7f0000000040), 0x1000000, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffd000/0x2000)=nil) 16:30:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) 16:30:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000240)=""/174) 16:30:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000001700)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/242, 0xfffffffffffffefb}, {&(0x7f0000000180)=""/4, 0x4}, {&(0x7f0000000280)=""/81, 0x51}, {&(0x7f0000000300)=""/30, 0x1e}, {&(0x7f00000013c0)=""/247, 0xf7}, {&(0x7f00000014c0)=""/153, 0x99}, {&(0x7f0000000340)=""/17, 0x11}, {&(0x7f0000001580)=""/164, 0xa4}, {&(0x7f0000001640)=""/173, 0xad}], 0xa, 0x100000000) 16:30:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x20000000000}, 0xc) 16:30:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '-md5sum'}, {0x20, 'mounts\x00'}], 0xa, "59d18b48b06a366077f93b28354b5a05816590c9181685321a185c4df057fdb9f9563bf7dc0ae20906a98199e9114baf7288d8425406bc7a9812d9fc4421bf87482d23e7476109b69283c13cfd9b7b9d19cab49327416aa204a8384228cdf0a7bd87751288df392cfa56b68be16b3cd3dca97ee5734b2b23f203d3c0b24da9910fbfeb3c0cbe3c14ab73727eff2bcf91d81779dd2526a84f7af84796f579b19684606098d843030316d45c2859f5b6d81e938bf4529d1303ba241a34e42039a73aef25b1220702e93c6448c5fb3802224ed042dcde892f5089d62f67526d9d2dd9a635f60366df877e9a027e48409aa0dff8839e5c63a39e"}, 0x113) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r1, r1, &(0x7f0000000000)=0x20000, 0x800000080000002) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x7, 0x8, 0xfffffffffffffffe, r1}) unlink(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000100)='\x00', 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:38 executing program 3: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x6, 0x2) 16:30:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x3, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x4000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000300)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x0, 0x3, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:38 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0xffff, 0x370000, 0x7c0, 0x2, 0xefc}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x1, [0x100000001, 0xe0, 0x9, 0x1, 0x42a3, 0x1, 0x7f, 0x6]}) 16:30:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x1b, &(0x7f0000000080)='posix_acl_accessvmnet0proc\x00'}, 0x30) capget(&(0x7f0000000100)={0x399f1736, r1}, &(0x7f0000000140)={0xcd8, 0x663, 0xfffffffffffffffd, 0x4, 0xfffffffffffffffa, 0x1}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80000001, 0x480) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000040), 0x1, 0x0) 16:30:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) fcntl$setlease(r0, 0x400, 0x0) 16:30:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:30:38 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x9) mmap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x1, 0x2011, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfff) 16:30:39 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000340)='net/sockstat6\x00') fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000680)) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x80) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000540), 0x4) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000006c0)={0x0, r1, 0x1}) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast]}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000600)={0x7, &(0x7f0000000580)=[{0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000640)={r3}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8001, 0x20, 0x1000, 0x3, 0x0, 0x4, 0x20400, 0x8, 0x0, 0x4819, 0xfff, 0x6, 0x6, 0x2, 0x101, 0x0, 0x5, 0x8, 0x1ff, 0xd90, 0x7, 0x7, 0x7fffffff, 0x10000000, 0x3f, 0x38, 0x7, 0x3, 0x2, 0x72e4280a, 0x3f, 0x7ff, 0x40, 0x8000, 0x80000001, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x8, 0x3ff, 0x5336, 0xf, 0xffffffffe4fd3e53, 0xd90, 0x3}, r0, 0x5, r1, 0x3) r4 = syz_open_procfs(0x0, &(0x7f00000005c0)='cmdline\x00') sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d0000000310008002abd00000000df25000000004d408401a6416215c1162d20be6d4759fab78cb229ff6b11fac0d8f866f2632525252d6910bfaa4ebd97b508070534eb7b34f2bb291595ea89697c425c98157269870ab39b791241146920bb809658942bf4bbf106a596a88c269f215f1f22a506c161626c71be9209886159a580329502d6f07af6026a635442459bcbcfcf3c40abf79716c86d1a264a0b96b97fab7ac699a1769b439593d165a1cdfc3ac67f6ea7df6ca1f5e3da34ffeebae8703dc8dbdd6eeaedc593c4ef5b0000"], 0xd0}, 0x1, 0x0, 0x0, 0x4000040}, 0x40000) preadv(r4, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1000000000000130, 0x0) getsockname$unix(r1, &(0x7f0000000280), &(0x7f0000000300)=0x6e) 16:30:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2100, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f0000000140)={0x7ff, 0x3b9d, 0x8, 0x1, 0x10000, 0x2, 0x0, 0x4}, &(0x7f00000002c0)={0x800, 0x7, 0x1, 0x3, 0x3, 0x15, 0xd5a, 0x8}, &(0x7f00000003c0)={0x85, 0x5, 0x7, 0x2, 0x8a, 0x8, 0x2, 0x8000}, &(0x7f0000000640)={r2, r3/1000+30000}) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000200)=""/140) r4 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000300)=""/174) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000540)={{0xffffffffffffffff, 0x3, 0xfffffffffffffffc, 0x3, 0x5}, 0x7, 0x6, 'id0\x00', 'timer0\x00', 0x0, 0x6, 0xada, 0x76, 0x8}) r5 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0xfd, 0x6, 0x1f, 0x0, 0x6, 0x14060, 0x4, 0x4, 0x800, 0x6, 0x4010000000, 0x7, 0x3e9, 0x0, 0x8, 0xfffffffffffffffc, 0x3, 0x7f, 0x3, 0x49, 0x100000001, 0x1, 0x9, 0x3f, 0x2, 0x400, 0x4, 0x1, 0x5, 0x1, 0x100000000, 0x1, 0x7, 0x7, 0x4, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x22001, 0x15a9ebd1, 0xfffffffffffffff9, 0x3, 0xfffffffffffffff8, 0x80000000, 0x9}, r5, 0x0, r4, 0x1) 16:30:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) recvmmsg(0xffffffffffffffff, &(0x7f0000007a40)=[{{&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000540)=""/253, 0xfd}], 0x1, &(0x7f0000000640)=""/243, 0xf3}, 0xff}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/3, 0x3}, {&(0x7f0000000400)}, {&(0x7f0000000740)=""/49, 0x31}, {&(0x7f0000000780)=""/111, 0x6f}, {&(0x7f0000000800)=""/240, 0xf0}, {&(0x7f0000000900)=""/94, 0x5e}, {&(0x7f0000000980)=""/213, 0xd5}, {&(0x7f0000000a80)=""/39, 0x27}], 0x8, &(0x7f0000000b40)=""/179, 0xb3}, 0x1000}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/130, 0x82}, {&(0x7f0000001cc0)=""/19, 0x13}], 0x3, &(0x7f0000001d40)=""/123, 0x7b}, 0x9}, {{&(0x7f0000001dc0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000003e40)=[{&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/4096, 0x1000}], 0x2, &(0x7f0000003e80)=""/45, 0x2d}, 0x6}, {{&(0x7f0000003ec0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005040)=[{&(0x7f0000003f40)=""/183, 0xb7}, {&(0x7f0000004000)=""/56, 0x38}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x3, &(0x7f0000005080)=""/206, 0xce}, 0x6}, {{&(0x7f0000005180)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005200)}], 0x1}, 0x8}, {{&(0x7f0000005280)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000007980)=[{&(0x7f0000005300)=""/4096, 0x1000}, {&(0x7f0000006300)=""/179, 0xb3}, {&(0x7f00000063c0)=""/201, 0xc9}, {&(0x7f00000064c0)=""/199, 0xc7}, {&(0x7f00000065c0)=""/219, 0xdb}, {&(0x7f00000066c0)=""/238, 0xee}, {&(0x7f00000067c0)=""/181, 0xb5}, {&(0x7f0000006880)=""/213, 0xd5}, {&(0x7f0000006980)=""/4096, 0x1000}], 0x9}, 0x3}], 0x7, 0x2, &(0x7f0000007c00)) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000007c40)=0x6, 0x2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="5b71a3bc9b4a83a82b247192ea178f93e7cd35fc6a01e6bff7996c0c57432c5beb187e593ae3efa661a7ad501ba05afa7dff7928488718775f16fa99564c5fd82ae3678ef971cf3356efb30d0364a061a948e7467ab0877714965d65d1c6378db439471fd314222f9fb0ebc63b013c0a52762cacc299d010fea7dba98285777d7b5e5c0e822f5109d5e7e9eb282365", 0x8f, 0xffffffffffffffff) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000005200)) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) 16:30:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x40, 0x80800) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000100)={0x0}) r3 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000a00)=0x4) fstat(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() r11 = getegid() fcntl$getflags(r1, 0x40a) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010002000000000002000600", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="020002e960efaee9b232", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="02000700", @ANYRES32=r7, @ANYBLOB="040005000000000008000100", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="08000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="1000d7bc000000002000020000000000"], 0x74, 0x3) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000140)={0x0, r2, 0x201}) r13 = socket$inet_sctp(0x2, 0x5, 0x84) bind$netrom(r1, &(0x7f0000000900)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$sock_inet_SIOCDARP(r13, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast2}, {0x1, @random="fe416543848e"}, 0x0, {0x2, 0x4e23, @multicast1}, 'gretap0\x00'}) 16:30:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x20, 0x4) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0045878, &(0x7f0000000240)=""/174) 16:30:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:39 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1a) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/172, 0xfffffffffffffd05}], 0x11fd, 0x6) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FICLONE(r2, 0x40049409, r3) 16:30:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000540)=""/135) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x6) 16:30:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x400000) getpeername$ax25(r1, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @netrom, @default, @bcast, @bcast, @bcast, @default, @rose]}, &(0x7f00000000c0)=0x48) 16:30:39 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x40401, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040)=0x7, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_cache\x00,\xa7`%w%\x15~\xd80x0}, &(0x7f0000000140)=0xc) r1 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x2, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}, {@index_on='index=on'}, {@metacopy_off='metacopy=off'}, {@nfs_export_on='nfs_export=on'}, {@nfs_export_on='nfs_export=on'}], [{@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}, {@measure='measure'}, {@subj_user={'subj_user', 0x3d, 'securitykeyringvboxnet0'}}]}) 16:30:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') syz_mount_image$nfs(&(0x7f0000000740)='nfs\x00', &(0x7f0000000780)='./file0\x00', 0x10001, 0x1, &(0x7f0000000800)=[{&(0x7f00000007c0)="4459a18d74c183138ca925be34a7a116a4c1dcafdf6ab7fc954964d6f7f26849dfdbdeb1698fde3efe5a6f278ff80379cfd3418e2f", 0x35, 0x49bef44c}], 0x0, &(0x7f0000000840)='net/ip6_mr_cache\x00') keyctl$session_to_parent(0x12) getsockname$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x1d, r1}, 0x10, &(0x7f00000006c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004040000ba25000000000000", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="020000c001000000040000e0210200008047432940f862d3520d31c0dba639bf336c1b5d2a5bf5dddaeaf390c751cdf8a430de7c52d0a3ca744314131d5f016439c44a6dc5c7ed25dcb364da5b172f9df7ee9252e3c235ab403bb87bf3d5df2382c327b42eb07809915dbdc0d39e602ef1af4ad4"], 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x40) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {0x7f, 0x100, 0x18, 0xfffffffffffffffc}, 0xb, [0x4, 0x9, 0x6, 0x5, 0x62, 0x5, 0x3, 0x8, 0xffffffffffffffff, 0xb2f0, 0x2, 0x4, 0x6, 0x6, 0x1f43, 0x100000001, 0x3, 0x3, 0xcc, 0x1000, 0x0, 0x4a8, 0x10000, 0x7, 0x8c, 0x7, 0xcc44, 0x0, 0x41b5, 0x101, 0x0, 0xfb3, 0x1000, 0x7fff, 0xf952, 0x7, 0x401, 0x1ac4, 0x10b2a2d7, 0x4, 0x4, 0x100000000, 0x9, 0x0, 0x8, 0x9, 0x3, 0x4, 0x7, 0x6, 0x101, 0x2, 0x9, 0x9, 0x7, 0x5, 0x3, 0x6, 0x9c1, 0x7e, 0x5, 0x0, 0x8, 0x76], [0x8, 0xbab, 0x2, 0x80000000, 0x40, 0x7704, 0x1, 0x401, 0x2, 0x8, 0x8, 0x2, 0x166, 0x0, 0xce03, 0x512, 0x5, 0x0, 0x6, 0xff, 0x4, 0xffff, 0x1, 0x2, 0x80, 0x1ff, 0x8, 0x1, 0x800, 0x7f, 0x401, 0x1, 0xc6c, 0x40, 0x9594, 0x66, 0xffff, 0x2, 0x1, 0xc2f, 0x0, 0x8, 0x3, 0x7ff, 0x0, 0xad38, 0x1f, 0xffffffff, 0x2, 0xe26, 0x80000001, 0x7, 0x2, 0x80000001, 0x1, 0x1000, 0xff, 0xf581, 0x2, 0x8, 0x8, 0x8, 0xffffffff, 0x7], [0x1, 0x3, 0x7, 0xce5, 0x3, 0x1ff, 0xfffffffffffffff7, 0x3914ca2d, 0xccc, 0x3f, 0x6, 0x0, 0x7, 0x7, 0x3, 0x3, 0x8, 0x7, 0xc9, 0x6, 0xffff, 0x8, 0x1ff, 0x8, 0x6, 0x5, 0xd68e, 0x4, 0x0, 0x10000, 0x3, 0xffffffff, 0x5, 0x8, 0xffffffffffffffcc, 0x8001, 0x7, 0xe5fe, 0xc3, 0xdcab, 0x1000, 0x1, 0x8, 0x0, 0x1, 0x951, 0x5, 0x8, 0xffff, 0x3, 0x800, 0x81, 0x4, 0x100000001, 0xffff, 0x1000, 0x4c, 0x1f, 0x5, 0x5, 0x7, 0x6, 0x4, 0x7], [0x7fffffff, 0x9, 0x67, 0x0, 0x7, 0x8, 0x4, 0x200, 0xffffffff80000000, 0x1, 0x10001, 0x20000800, 0x400, 0x9, 0x4, 0x2d03, 0xc2, 0xc761, 0x0, 0x1, 0x4, 0x9, 0x8, 0x3, 0x2f1a6918, 0x1, 0x10000, 0x6, 0x5, 0x8000, 0x3, 0x7fff, 0x4, 0x9, 0x61f3, 0x2, 0x7, 0x3, 0x3ff, 0x1000, 0x6, 0x100000001, 0xfffffffffffffffc, 0x3, 0x9, 0x7748, 0x7, 0xb4, 0x0, 0x0, 0x1ff, 0x3, 0x4, 0x4, 0xffff, 0x1000, 0x2, 0x29, 0x10001, 0x9, 0x614e095d, 0x1, 0xb8e]}, 0xfffffffffffffe58) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$void(r0, 0x5451) preadv(r0, &(0x7f0000000380), 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000880)={0x2, 0x0, [{0x8000000f, 0x7, 0x7, 0xcb6, 0x6}, {0x8000001d, 0x7, 0x5, 0x1917afda, 0x8}]}) 16:30:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='system.posix_acl_default\x00') ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8200, 0x50) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x88) 16:30:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc0189436, &(0x7f0000000240)=""/174) 16:30:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r2 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) getgroups(0x0, &(0x7f0000003540)) sendto$rxrpc(r1, &(0x7f0000003440)="5371a62bdd257b5ad7aebb7ab69fbe39d847f2ab6666c4b6ec8548ad2e371956b448a772c45384135bdb33e92a435c8b0cddcf3da7f3bea7877a46d77687e3d29b979e06c14f9f6ab230cce8f535103e808d04400f04cbf9841e634abf8e89d6368feda9a8ed9d5f853a2cc1ee17d4106967d3e4cced17f156820aae8765f23af6b161e66d52b45661de2dd01f3e21", 0x8f, 0x20004000, &(0x7f0000001540)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x24) r7 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f0000000b80)=0xe8) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f80)=0x0) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080)={0x0, 0x0, 0x0}, &(0x7f00000010c0)=0xc) r13 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002e00)=0x0) lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r1, r13, 0x0, 0x7) sendmmsg$unix(r1, &(0x7f0000003280)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000000c0)="02fabd5bb75241c2d0191e4c74ecd931043d988f50ac5bd40c0007c08e7ad67c40d88f84a629715f3014", 0x2a}, {&(0x7f0000000200)="86b1b2f41142e3d15403c96bb4faa5e8cc282fd3a19f0a91fa053abaf5635f62b8dfa531b2582a88ebff070604465f342bd07798e5623286629676957151983fff18dacfaa905714fed2d65cf6d0fef1a35d6605491373620cba7e8c6d3289a6717558dbf427e4780c2ae09a1f489dafd8345306ec6ff85ecf814fb1de32a501203b027b201191691f3b9324c094f123d4fa9da14964a9aafedef4606672413adc4209d967d31f834c7166fa06e74e60625a2f823828cdd3d0cc0436c5bca01e", 0xc0}, {&(0x7f0000000100)="fd0e55cf0213dde792def80aa3b2c23716200509edc381dc6f44cdc0284833262c61c0157042a778", 0x28}, {&(0x7f0000000140)="00e562098f42f9dacdeca03f", 0xc}, {&(0x7f00000002c0)="171fb9da1599e0022e998b651d8a68737a082477583638cf441473f2b3dabe059039224a5e4282380405d82ee24dcaa7ba7124d71a813649a2147d590d10f7f5a1e3815f2cdf60e13cc59ce751", 0x4d}], 0x5, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x90, 0x48000}, {&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f00000007c0)="e85e0d9ee1e2aa3c77417230ab58fefa0704a33dea4c8b234338f1dcee83fac3a42e6e5587be58238daeb2e310da25a0db6c89a2e05407ab1cce03934220c2be66e2e003f33298548fc4da7fbe28abdff918dec33e563572f10e1f267ca890ea5800caf4bd061c7f08af9bf3d5abc192d72fe065ae75613d3f93bc571af1b366e9f42e5efe081fbfced9f3c1d82e1a11ffb62f5e57db6db8ef65e2ee0d4682", 0x9f}, {&(0x7f0000000880)="6402130fd8a5531cbb1e78157e10472bb7f6934ebdef83a17dbaef13eac3fae8baa186b60b7bde3da590566282c042e34b5f7e21a2074967edad690f0490ea38e4bd77d47f5e857c3c20b5d9901fc68708b2f78d75f39d9645ac7860af46c0bc748240a57bcaec1fd0a2363421f7e8850ee6d234e896ac709f42b2fb0add2c", 0x7f}, {&(0x7f0000000900)="78edc8ab34d4a1111782a7bb5895524250255fa2873659b1c1043a8b131da665e5e92d6f7f3b514f05a91ac9a5b442435d23b4d17d5c98aa4bc25f709c9a372f6c675444c8c0103204633b6fe262a47cb7f51d3c85129d5e75b11b065f97582998d4a1c2fe5504feff92430873e9da91678e4b19999cc59300316a68291e6f0974f1bc6fe689f1480c97aff5d495a4db5b4947a7e96790add252d484a0804e0254d5d1f5f48879ac9c3cdd917d6c0d91bc08ec541ef3baff9e675a77612565ab8c5d8284", 0xc4}, {&(0x7f0000000a00)="d4ffae", 0x3}], 0x4, &(0x7f0000000c80)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x80, 0x44000}, {&(0x7f0000000d00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000d80)="28f43bd49a926d5923e8f405bbae68c61547a5d6dd480327b3522426075f2c12f08d430349bd67753fd7227cf88a977dba9cfeb6fe27e09d50b82b3b1018aaeb38f5ad399a52f772e83a387d9f80bd9101e8461ec251a9eb53edcdc3ffe2dadd731b84bcab10638007e2ae60a963ae7e05af6df09d8207f69e8a61e277c95057855b6558", 0x84}, {&(0x7f0000000e40)="b380e5fc77b5131089b1e0949e4fa2c686acca0b9adbc7bb2d11b4932db979592d9184bc86f91572e926fd101b8107fdcb9869ae5179af39d5036d6a9eb1216d42a5e685765936f4ad5d176e30c609f221584be93b66850bcb8c21cd8ea0b272895a7bb1da93fc6584eba5ac49b5617fe366a883d5f38b676a10766d7ed7603eb8da18270528ed4c18cad46c9b84e0532acda5289a81859a8896b87edaf7d53088359925590f9e0c9cb232", 0xab}, {&(0x7f0000000f00)="26e9157c034f0f45a3bf6c1fcb", 0xd}], 0x3, &(0x7f0000001100)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x88, 0x40000}, {&(0x7f00000011c0)=@file={0x1}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001240)="17739944430ca97ed1197811668dafe027e15815b0603e3199e5f56157f2a4b5c49721a2789d9af8ae4369fcfbda6e0aa8ca77db926f73c5f8982099a066b03fbc7336c1ee90a73b5b474e2a7d2709b3ab0d58875e2eea07f128bba3ff868bc035e9171498ee05080e5c17407487c0a55bb90195e57ea7498dbbadd3b65c99a97ea4ee4f2fab01b46d7734cda998e7b0b393bd7ffd8d520132c60f6d2cfec2d5700a9de44cbbee8a1b752c9c03dfece311d3b8a8d4217c777cf232771524c411f5f88e8ce6a5684503ff1d37c8d47fbe", 0xd0}, {&(0x7f0000001340)="7e89fc0d54dad114d515408826cc383cb3aab052bd5251a4e450c4b921af048392edd5dab347a04d6be60b8ceeb2f80caab522c556516faa9f8757a11d6b696a0c2d7d44271e51d609124fd4cea3788b44699d2e02317cc0d3d572766061d5fba2aa5a4bfba211f1e701aa485fa72ad26d7a1cd1553cc1e9781ffccc09d3a11eea42d38d1ff16e57d8db5dbba7024ed3de34283984e3b9e4e8b4b419b879ae4245a51cab8c0124ce01667198db2663b6cc2d4f2df8c23df483d724c6385ba01230f51630770da36be22ac0071776bd85ded848778e67b8d2daf94ecb5176237c26", 0xe1}, {&(0x7f0000001440)="c81e17dab088a98c359872539b0e7ca4526b07599d878c9142e855374766ffcc6e6ef04b35019d411b4231970c4c2f25a8d5606c9c6ccdbf631ea169c5e944d6abccf15d40968204f82ed6ed980ef124eaf8ea5fb98ab1bf0c4c6c78829a482a15f103108be4700e529190cf", 0x6c}, {&(0x7f00000014c0)="9c67d32d51cfec633dc3082e6ee97200e81f7a02dcf749f3d9bd7c7e82f95ae1a961b0903e60753a5d198bb38f3c08955e2755f0104c6c03cce47d6de561f6ec525e386a80be658b3ee2895a64833f7259d36ad81a3bdb5969de509b51bbe2401559cf6b20c9dcd57b41a69e3f493ca1142591e3d795e9876483ab", 0x7b}, {&(0x7f0000001540)}, {&(0x7f0000001580)="8cbe5ccee8093473b225ce44e40cc25069b7225bd161850e003a8d37141443d07b2536584e37484ee7ef9908381ab6c6320d18db10f9213610e7d6a566f267b439e5a3bef4cde94df5afffb094999f3058", 0x51}], 0x6, 0x0, 0x0, 0x40}, {&(0x7f0000001680)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001700)="6515cce77fc1ba8b68a0dd2a6175dd4ec3b405dbf85f27028e2d140e3bd860642e5e96730f587c33cf7738e8036610758909fc45e2199ac5be3b701ee62dbc021489c200106fce3594f101fdfb246c02290f12985e445ecdebaf97009098a30e20374ee87912df3b1370af0f74920d3959e15a149ecd216d748b4f2babefae52b9cab3", 0x83}, {&(0x7f00000017c0)="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", 0xfb}, {&(0x7f00000018c0)="fe11ce098def8d2c23f4e287103648364498ddc08fec47a922c95dd13dc0d6fbb5144ec4354c42f8c7c8f95e9a0da4092b729126adf4ad7bd49a3584a766d0647decec6618b20c3cd6e769ee588e240138b51d46199f3dc1bd13933b11ca1389f0a2d79c6e406c469885399842042413fac937ceaf9d1eab3a8f1d28872691f719e94b2d79e5ba6c12214cf567bba68bfff6084e6ac523614ae05e5993a89691589e440490ebed8347c10a387e7982afa315c7132d569fdc541125c3972f7040c218fbb8fa4a8aa53d", 0xc9}], 0x3, &(0x7f0000001a00)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r13, r0, r0, r0, r0]}], 0x40, 0x20044080}, {&(0x7f0000001a40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002d80)=[{&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="948081e6ee9953fcd613e27a93c712a2cb86bf19ce9b2f5ff6c92c89e34c2e060bafcaf19ba16fb63093692a1f75dee85690d9e12a59f98786bc29b4ee9884a1c4e2905b821fd0eea070dbfe41a13bab8a21b6", 0x53}, {&(0x7f0000002b40)="ed6ebf934912929a17977c9dd0a82a5e8b8e93fbf9e00cf22fb16875733d18b90b540ce1e4e10b3ef77456cf58356de2b4b30062ac50d7f0c516e679b95dbf86740dc354859692b4668ba6ed374432a98ca935343987880a75c667e069d7504c736d5d557e2a3c9bf3ee1d252c9e5c0d3993657957f1d4d632aa573d9be4c3689eaf101a1d12b89009627b326d15b3f53241a81235002eb69654c67ab0784a0c1586", 0xa2}, {&(0x7f0000002c00)="74e4666fe6e632d73d6cacf7c5422c5411bc71bcf86235ff221b9e32d30fa26236163df7dfabe467ed967e82ba8b6d2e20b3185977770dbb0ebfde0c5acb655db9bf37c358263ed4dc814c27baba059bb422c0e957f26c845ce97c035349b3901a755502f4e4e59cf3d8b5fac5c4301c518ca1e9e3823fd27abfcdc25bcf3ac3b14ab934fc75b5e543f624497bc573be94a4326204e7fb6ee965b6290049dd6858e91c37cf6be861c44f", 0xaa}, {&(0x7f0000002cc0)="1c09dff38a315ff6181a80686e506b56f8a58443878d1b09bcf9937458802d1a163e6d5e911c5767da05737d9f8e4637b6555f4811aa0e49fcad70cd8f51e96c451814339607a5f924036970650b537e9c479f2228ef63dfa6e28961a4668e807fcfb3e97574845a14699b27d58ebbaf43d01cb2225ebca136f69ddec0f3cc05bf95c15701b99069ec7ec5d5b16dcfdd31ad197577affee98b42d5a096bc316240260f7c09e97c1e18dd5b1a64a5741ceb05dc8403b7", 0xb6}], 0x5, &(0x7f0000002f80)=[@cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0xd0, 0x8000}, {&(0x7f0000003080)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003200)=[{&(0x7f0000003100)="847f2f37ac2d64d43afcfb20799d8891ae36333be1605441469963a53639d6c0f4c3b60b2f54045eadc0cbaea7e8fc924ce65b479c1af2b489b3d5cf272d9e", 0x3f}, {&(0x7f0000003140)="10badaad18d3ebd6fef9ef856863a2804107f8340e2121289ac1f189550913dfd1db61475fa2dd20dda879e80b1b0b9b5a9478cae4ae77ef66ae472b0e03c5633bba1facac421f63ea9bf4e278cf6351f01bc7c65b6ab7493f1798f5c0b076b4d6966e112711897dc9624561da68a2b1e19196e811c3a05ebd116d18f7331e014e5bf04c29894f584cf32519e981c8c9612b185bc4aa66d5d3a44a6d177fc6936ad4406d0c89ef7d014051fefc19ada78d151f8f6102db4967b7a81276844a", 0xbf}], 0x2, &(0x7f0000003240)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0x40, 0x4000}], 0x7, 0x4) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x21813, r0, 0x0) process_vm_writev(r14, &(0x7f0000003500)=[{&(0x7f0000001000)=""/127, 0x7f}], 0x1, &(0x7f00000048c0)=[{&(0x7f0000003600)=""/149, 0x95}, {&(0x7f0000003540)}, {&(0x7f00000036c0)=""/175, 0xaf}, {0x0}, {&(0x7f0000003780)=""/27, 0x1b}, {&(0x7f00000037c0)=""/4096, 0x1000}, {&(0x7f00000047c0)=""/226, 0xe2}], 0x7, 0x0) 16:30:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x5}, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 16:30:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1fffffffffffffe, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) 16:30:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0xc020660b, &(0x7f0000000240)=""/174) 16:30:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000300)=""/174) 16:30:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xee00]) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x400) 16:30:40 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x6, 0x200c0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x200000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000800)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x44800, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0xc2b1859085b29113, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000440)=ANY=[@ANYBLOB="05feffffff"]) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x5, 0x8000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rfkill\x00', 0x900, 0x0) syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x424, 0x100) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x840, 0x0) ioctl$EVIOCGREP(r3, 0x40107447, &(0x7f0000000300)=""/174) 16:30:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x840) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) write$smack_current(r2, &(0x7f0000000040)='\x00', 0x1) 16:30:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_names\x00') fcntl$setlease(r0, 0x400, 0x1) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/172, 0xac}], 0x1, 0x0) munlockall() 16:30:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000080)=0x2) 16:30:40 executing program 2: r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000a80)='/dev/audio#\x00', 0x9, 0x40) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = getpid() r5 = getuid() r6 = getgid() r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = gettid() lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ec0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000001000)=0xe8) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)=0x0) r14 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000001200)=0xe8) getgroups(0x7, &(0x7f0000001240)=[0x0, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0xee01, 0xee00]) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001280)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400), &(0x7f0000001440)=0x0, &(0x7f0000001480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000014c0)=0x0) r21 = getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f00000015c0)=',$\x00'}, 0x30) r24 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000016c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001700)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000001800)=0xe8) r28 = getegid() sendmmsg$unix(r0, &(0x7f0000001980)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000100)="338c005e0b760bb8e3a00c7c62c84f2ff584b71689d252ca60eb9ab1d515948d9b58b9d01761ad6e5fe25636e7d4b3317bcf1ee336e78929523966bd960b9a1cfd1a655ccfc2ea197cf71b1768511b34ef6e36b6813e56b30006b685002d396f2d7cea48dfbd4d61b553b0d97e1d43897b666ede6827065c0f735b5371b0a4ac42f977397332de80628ae5256f91344f4a44d834b037ce165f4c2a", 0x9b}, {&(0x7f0000000300)="62813fbc55090d0a10564e056dba0851ea3c6c5fd3f27a327c15e44c4febbd8bfe9d1f48a3330d196a22d6d848804bcf5346ddced2483c7782942278a5d76a45a81e5632ee8f0ffff646ed9e09c69963f92ca793b9bdb528905e767471e29cea9d638ebc4db1f152beeb996af6ce0f69ee332476e5bec0e8b6b32b076807cad8d3c60581d91431ad852a07eb2b92793cd5654e0932ae82110310c70736704f876918f33a22c30fcb8772e5601f", 0xad}, {&(0x7f00000001c0)="ccb36142eaa346aed532cdbe54909cf085aeddb6e07db68b008be2638fcec10fb92f2abe6fe12e32528229d9e0367c6da686a2678963b984486595c0b6abb7ffa8d05a63b1459b80c9ce70e73a7e", 0x4e}, {&(0x7f0000000000)="5bd8341a7b3a22bccd4baa", 0xb}], 0x4, 0x0, 0x0, 0x20000010}, {&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a00)=[{&(0x7f00000005c0)="9c6e30d01874b5b71d15cd75b979b030e1d4f28aa130f5e2c0479823828572b0edad7d374a31b728f0a58cedcdc7a60925ff3d87b0d994f29f9a66273207ca65e32a782eff1a250de6ab7805a8d918188dfd3bef3aec5feb3a001dfaf74cebbcd2c988c4bc770b63fb36ee6f7e8f1c5d3b61eea0513692eccbee57c8dfa70f448518d7dc7680d31da183291ed056d0e9ca50975d5caf06", 0x97}, {&(0x7f0000000400)="c5cdd84daf55e9ff3f61a1f61a5166b8d2da3b", 0x13}, {&(0x7f0000000680)="1f7a3295cc6950095561777d1464e3559d5587e48e8742dba0b264800fc80a2f9e2256c14abf4a43ae9a9ffc7e4cb7511ba5ebc0bf8007869946c68bffa3d0afe8fac90eeb9cba91d6bdd40130063fee789bfee3cd01e1fa97c3ffd755205bbf2118d59eaf809bbb132d8929c92a2a55dc23ce6ac31562d46222d27e49f217a6ff38f1556cfa69853f4ff2b6571c75088a64bc9291bde3a549ed9fd4e23a59b4a14f894c217a4da123cbf8c7f0656517b6ac46de224705c90e11d9667b421b3e03af985a0df9ef8ef81eaf9446e9d5c47b9293dd2f61368932b98d618f790a08712cab919a2ca8647b17f7", 0xeb}, {&(0x7f0000000780)="406e4c580ce40e4e02c46a7f7ebb9be7b79e890e75242061dfd00592bf3be206902cb124fc0ba9fe16d5335c4ca20f8ea0b9baeb5fba92109846ec67b99bf05e4f7347925c78845a8bd1b693fabe97c39b83047de8d663062fdcb867051b1c9b93555dc5b1a98ca227ba1cb8", 0x6c}, {&(0x7f0000000800)="f116f91ea3596ec4fb33347dc19ddf0dd28e0246c3805f016904e421a9ee3fd58029d326378680af5f952ca3d30a0cfcdca62201d86c0cd1a71d26538bfaf8c80d25e28b83e9deb73ff3f150706a41125dd2f623d11fa1c0d6316ab6f041b141a19546eba837e70f182ac611a7355cebedf309eb80e7e28cc421df34840b7c5cedf3fac4b81a44b6c454d52398e0bf6959deed32ea5aabacbf3a8e10f41c9f751985ce6b884747d16e393dc58879750786a4896811d3319c2cc5da07f4023ecbfe64cc8ea0c54d423ceae1c48b252c4a", 0xd0}, {&(0x7f0000000900)="d292c8d63b662d39c915858af1c1471ac4dfefb9278ada71e57b60d30b4719858244de89cd", 0x25}, {&(0x7f0000000940)="958b4241d27487b3d08f5a7e13dcab7d1c943634c7b346b34fa687e7f507d7d4e7e141aca818022c249c84cb1f4cadb27ec0a66c8c8cd1457911f84601b6e52f72695e09b0cc8c8e1dcbe658a88c38f3e3278d2afe08fb9e7e8a66b7df99398bb54f47c0616d1df30ef970cf215c92459740190adb6cf6726aba12fafc72ec8de9e3257e4e0294f241dcd653ddf649612f263b6399d2", 0x96}], 0x7, &(0x7f0000001a40)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="ce5ed27300aa80565ca078568b3465a594988b81d756309baac2b67c11b8062887ffa8791d355d3f030d681d76a66fbc0c8c9ac63381d88b6dad9a4468e6105f58deaf40b2a25ed7d04e57dc745c7ca62e9ac9679d562a0122ec9d2ce5faa86309ee7739af97423b8ff82fa6321aeca2fed4b0853fc0aa"], 0x20, 0x48040}, {&(0x7f0000000b00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000b80)="f5b723c5a739006ce02a8cbabdf9b6884928a0c3e05f227df4af78c51d9a51ecb4a5542744527e246202e3cba951c1b086f7322f9473d1c4fe072a4f45f06336fcbac3e6a294f869ffebac4e5d2855c6244863a139d8cc9b047c29b1dfda683645c3686d019fae611af88e4dc33ba17d320af88c4abf80140925ab1e6345797f3e2f2710d6c262e85c4c30939e9678847ba44322e954cf7473fad04655ac038a5d1b14021a41d7f82bb313cdb64d522f5592ef6f63b78e5871382640b3ef857fee8a05401ca9f03ac15a929e9060f3f0215bf52596cbaee9a7fbfb1c9dec2a1e0470beb58101495f02ebf68bba0e2e", 0xef}, {&(0x7f0000000c80)="ccb831525c5df7525663174e9bbafdae9a211ce4b1997682ba9c49ee83fbdae2", 0x20}, {&(0x7f0000000cc0)="2820e3f9a44c6cee420533e5361b9b8898796633b9034ee9b67b10550e84425a2ead29d0223d72db9d6e61269f7d009a1cbb19956c406715cd6ad83e835f4c4eb4672a052bb08755512a939122ac2f2fd99d1add41670b766aff958165958e3f9367849c8025c817d9c02b6ef452125029af3a3c93001c03dea64c8b8649ac931aa1ebb5daa4c62929d8b957f02cf7f379af4d874fa54d63e9e238511162c851c0c8beed328ae7b5988ffed76d941c93", 0xb0}, {&(0x7f0000000d80)}], 0x4, &(0x7f0000001840)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r7]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}], 0x128, 0x4}], 0x3, 0x20000001) r29 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r29, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r29, 0x40107446, &(0x7f0000000240)=""/174) [ 1134.141789][T24039] EXT4-fs: 2 callbacks suppressed [ 1134.141799][T24039] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$int_out(r0, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x220001, 0x2) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f00000006c0), &(0x7f0000000200)=0xfffffffffffffde3) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000240)=""/174) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x8, [0x6, 0x2, 0x8, 0x9, 0x101, 0xffffffffffff544d, 0x19, 0x3]}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000300)={r2, 0x7, 0xb8, "1d669393ae964e027101bed5134a24ea3901ccec458c93fa59132f2bdc5e3b37b60b3bb94b74cd68df8af55b4d4a66c8b27eb9479a43c25545b1bd2fc28835d32e8e94c19164e6d09fbf25637cd88f85c8c7f91160c000d39043151e09a7f760649c2e7795edd27872fc66025b862d956ee3f557de72e0bf8dcde7d9c762dc00140c4f69e3ded2630aed0101cf272cdb03468628551933cad112c2e711e5c6fa737bb381c0d0657edd40cd0cdf2c1b6238677aa60631db02"}, 0xc0) 16:30:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = geteuid() lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x4}, {0x5, 0xfffffffffffffff8}], r0}, 0x18, 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='@\x00', 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r2, 0x10001) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) 16:30:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 16:30:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x7, 0x0, 0x6, 0x2}) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x400) [ 1134.460048][T24294] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:41 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x802, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) r1 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000300)={{0x2, 0x5, 0x9f4f, 0x8, 'syz0\x00', 0x4}, 0x6, 0x4, 0x40, r1, 0x5, 0x5, 'syz0\x00', &(0x7f0000000080)=['/dev/ppp\x00', 'em1\x00', '/dev/ppp\x00', '/dev/ppp\x00', '\x00'], 0x20, [], [0x4, 0x47, 0x8, 0x100000000]}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000240)=""/174) 16:30:41 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x101000, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x73, 0x1, 0x4}}, 0x14) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40180, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x1, 0x2}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={r3, 0x7fffffff800, 0x0, 0x6, 0x6}, &(0x7f0000000140)=0x18) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000240)=""/174) 16:30:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0x547, r2) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x480000) ioctl$EVIOCGREP(r2, 0x40107446, &(0x7f0000000540)=""/174) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000140)) 16:30:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000540)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000640)=0xe8) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="99e5f76fc19ba3731c93adddefe51b1682ac1ddc62303f40dcb18fd20aea60569bb04b26d5dca0b4bf06cda528759f33a3bc1bb091a0d90e633782e0f17205e7d93ff4e0ea0ef5027af21f1c965f53bf1445c61adb5ced0748213bf347745d4ae0a79264a20d5129558a76b04e22a09e8f79f6695b536a026e605269f1f72e9c39a8785f05b69dec8ff29f72060698346b7b", 0x92, 0x4}], 0x0, &(0x7f0000000680)={[{@quiet='quiet'}, {@quiet='quiet'}, {@gid={'gid', 0x3d, r0}}, {@umask={'umask', 0x3d, 0x8}}, {@iocharset={'iocharset', 0x3d, 'cp936'}}, {@type={'type', 0x3d, "93ae6fd4"}}, {@part={'part', 0x3d, 0x8}}, {@gid={'gid', 0x3d, r1}}, {@type={'type', 0x3d, "8359c632"}}, {@type={'type', 0x3d, "d8c98de5"}}], [{@subj_user={'subj_user', 0x3d, '/dev/qat_adf_ctl\x00'}}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/qat_adf_ctl\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000100)={0x6, 0x1, 0xffffffff, 0x2, 0x9, 0x2167, 0x7, 0x8, 0x7d, 0x1ff, 0x1, 0x9}) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0) 16:30:41 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000080)={0x0, 0x81}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nfsfs\x00') removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '/dev/dlm-control\x00'}) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:41 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x204400, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffffffffff00, 0x4000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000200)={r2, 0x4}) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f0000000040)=""/174) 16:30:41 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x303200, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/43, &(0x7f00000000c0)=0x2b) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) [ 1134.861361][T24626] QAT: Invalid ioctl 16:30:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180)={0x0, 0xfffffffffffffff9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0xab72}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000380)={r2, 0x63, "ac3ea53c8bbcc59ee35c53196f7c96ae77311289350b894686070d3e991cf6f66ecfefbbc829a9ca4bc3b2e3eda62db137462077572a4e52d1c9d76724eb4f46148d81a81821023e712ef92d68dec6813d3a26418301b3436b99f26f8e30d6423d49a8"}, &(0x7f0000000400)=0x6b) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x94) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000040)={0x1, 0x80000001}, 0x2) write$P9_RSTATFS(r3, &(0x7f0000000080)={0x43, 0x9, 0x4, {0x9, 0x400, 0xa5, 0x8f, 0x9, 0x4, 0x1, 0x283, 0x10000}}, 0x43) write$selinux_attr(r1, &(0x7f0000000300)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21) open(&(0x7f0000000340)='./file0\x00', 0x280002, 0x100) 16:30:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x21, 0x2011, r0, 0x0) 16:30:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x30, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x280000, &(0x7f0000000480)=ANY=[@ANYBLOB="db55c724ff1bf46547782c6466687467a5b007bcb617468bd8a2907b8a4a34be69643d", @ANYRESHEX=r0, @ANYBLOB=',access=user,privport,cache=loose,debug=0x0120000000000000,func=FIRMWARE_CHECK,mask=MAY_WRITE,dont_measure,defcontext=unconfined_u,fowner>', @ANYRESDEC=r1, @ANYBLOB=',smackfshat=,\x00']) 16:30:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 16:30:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000004c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000500)='net/rfcomm\x00') write$vnet(r1, &(0x7f00000000c0)={0x1, {&(0x7f0000000040)=""/35, 0x23, &(0x7f0000000080), 0x2, 0x1}}, 0x68) preadv(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) 16:30:41 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x62980, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10000) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000140)=0x1c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r1, 0x40107447, &(0x7f00000004c0)=""/174) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x200, 0x7}, &(0x7f00000002c0)=0x8) 16:30:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) 16:30:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xa0, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x433}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20008040}, 0x20000000) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000240)=""/174) [ 1135.228216][T24898] EXT4-fs (sda1): re-mounted. Opts: (null) 16:30:41 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xa) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$EVIOCGREP(r1, 0x40107446, &(0x7f0000000240)=""/174) 16:30:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000300)=""/174) 16:30:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001002, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x30, 0x0) 16:30:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x100, 0x30}, &(0x7f00000002c0)=0xc) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={r1, 0xd6, "89bc3def20367c24e87140a32666c53c7c20535b2c69d5792aba7ad27894f760c04ed8a04a85179a27e5959edaa4bf3517d8b1d26ad2688722e1a226be7cd976873d58ea872f30a32dae9ecb3bb3581f92c39ac39edcdea8a32ab817816bf65d0b21416e42db32ea091878b035c80ae29e6cad0f2ec0997b3431550e76eb4079583607d376bf0f8691be33cbab036fc4c1bc5dc4562d170e0a9fe8dbe029bcdfa8647862c3780be03f35bf67527374113b07e91403ca1306297b26e8aa134dc97f00f1e8675a0cf5f878791a1a7e5cd75bfd92057607"}, &(0x7f0000000140)=0xd2) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x2}, 0x8) 16:30:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1, 0x2011, r0, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x0, 0x3, 0x1, {0x0, 0x6cfd, 0x6f, 0x401}}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, 0x0}) migrate_pages(r3, 0xd, &(0x7f0000000380)=0x3, &(0x7f00000003c0)=0x7fffffff) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @dev}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'rose0\x00', 0x0}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uinput\x00', 0x802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={0x0, @remote, @local}, &(0x7f0000000700)=0xfffffffffffffeec) accept4(0xffffffffffffff9c, &(0x7f00000004c0)=@hci={0x1f, 0x0}, &(0x7f0000000540)=0x80, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000680)=0xe8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x2) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000880)={&(0x7f0000000900)=ANY=[@ANYBLOB="a4010000", @ANYRES16=r4, @ANYBLOB="00052bbd7000fedbdf250300000008000100", @ANYRES32=r5, @ANYBLOB="000102003c000100240001006270665f686173685f6675988f00000000000000000000000000000000000000080003000b0000000c000400060003020400000040000100240001006c625f706f72745f737461000000000000082e778289c0785d859048645ba70d7f00040007000000080006000000000000000000000000000000000000000000000000", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="8000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10], 0x1a4}}, 0x14) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000006c0)={0x3, &(0x7f0000000300)=[{0x200, 0x7, 0x4, 0x9}, {0x3, 0x9, 0x9, 0x7f}, {0x7, 0x8001, 0x7, 0xce2d}]}) [ 1135.618993][T25254] WARNING: CPU: 0 PID: 25254 at drivers/media/platform/vicodec/vicodec-core.c:151 get_q_data+0x53/0x80 [ 1135.630364][T25254] Kernel panic - not syncing: panic_on_warn set ... [ 1135.636990][T25254] CPU: 0 PID: 25254 Comm: syz-executor1 Not tainted 5.0.0-rc5-next-20190207 #30 [ 1135.646023][T25254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.656114][T25254] Call Trace: [ 1135.659439][T25254] dump_stack+0x172/0x1f0 [ 1135.663804][T25254] ? vidioc_try_fmt_vid_cap+0x770/0x810 [ 1135.669371][T25254] panic+0x2cb/0x65c [ 1135.673286][T25254] ? __warn_printk+0xf3/0xf3 [ 1135.677907][T25254] ? get_q_data+0x53/0x80 [ 1135.682253][T25254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.688533][T25254] ? __warn.cold+0x5/0x45 [ 1135.692888][T25254] ? get_q_data+0x53/0x80 [ 1135.697341][T25254] __warn.cold+0x20/0x45 [ 1135.701602][T25254] ? get_q_data+0x53/0x80 [ 1135.705960][T25254] report_bug+0x263/0x2b0 [ 1135.710337][T25254] do_error_trap+0x11b/0x200 [ 1135.714957][T25254] do_invalid_op+0x37/0x50 [ 1135.719390][T25254] ? get_q_data+0x53/0x80 [ 1135.723755][T25254] invalid_op+0x14/0x20 [ 1135.727930][T25254] RIP: 0010:get_q_data+0x53/0x80 [ 1135.732883][T25254] Code: 74 3a 83 fb 02 75 1e e8 9b 23 b7 fc 49 81 c4 70 02 00 00 e8 8f 23 b7 fc 4c 89 e0 5b 41 5c 5d c3 83 fb 0a 74 e2 e8 7d 23 b7 fc <0f> 0b e8 76 23 b7 fc 45 31 e4 5b 4c 89 e0 41 5c 5d c3 e8 66 23 b7 [ 1135.752521][T25254] RSP: 0018:ffff88806518f9c0 EFLAGS: 00010216 [ 1135.755363][ T3873] kobject: 'loop3' (0000000007337243): kobject_uevent_env [ 1135.758596][T25254] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90007ffc000 [ 1135.758614][T25254] RDX: 0000000000000149 RSI: ffffffff84b923f3 RDI: 0000000000000005 [ 1135.758628][T25254] RBP: ffff88806518f9d0 R08: ffff888088f30240 R09: ffffed100f8b8931 [ 1135.758641][T25254] R10: ffffed100f8b8930 R11: ffff88807c5c4983 R12: ffff888016b31680 [ 1135.758653][T25254] R13: 0000000000000002 R14: ffff888016b31680 R15: ffff888016b31680 [ 1135.758691][T25254] ? get_q_data+0x53/0x80 [ 1135.776796][ T3873] kobject: 'loop3' (0000000007337243): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1135.781729][T25254] vidioc_s_selection+0x9b/0x3e0 [ 1135.781758][T25254] v4l_s_selection+0xba/0x140 [ 1135.781779][T25254] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1135.781807][T25254] __video_do_ioctl+0x7f1/0xce0 [ 1135.781876][T25254] ? v4l_s_fmt+0xb40/0xb40 [ 1135.844819][T25254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1135.848593][ T3873] kobject: 'loop4' (000000001668f500): kobject_uevent_env [ 1135.851100][T25254] video_usercopy+0x4c5/0x10d0 [ 1135.851123][T25254] ? v4l_s_fmt+0xb40/0xb40 [ 1135.851156][T25254] ? v4l_enumstd+0x70/0x70 [ 1135.851197][T25254] ? zap_class+0x460/0x460 [ 1135.851228][T25254] ? __fget+0x340/0x540 [ 1135.851256][T25254] ? video_usercopy+0x10d0/0x10d0 [ 1135.869140][ T3873] kobject: 'loop4' (000000001668f500): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1135.871988][T25254] video_ioctl2+0x2d/0x35 [ 1135.872015][T25254] v4l2_ioctl+0x156/0x1b0 [ 1135.872033][T25254] ? video_devdata+0xa0/0xa0 [ 1135.872061][T25254] do_vfs_ioctl+0xd6e/0x1390 [ 1135.872093][T25254] ? ioctl_preallocate+0x210/0x210 [ 1135.872117][T25254] ? __fget+0x367/0x540 [ 1135.872150][T25254] ? ksys_dup3+0x3e0/0x3e0 [ 1135.872172][T25254] ? nsecs_to_jiffies+0x30/0x30 [ 1135.872211][T25254] ? security_file_ioctl+0x93/0xc0 [ 1135.937739][T25254] ksys_ioctl+0xab/0xd0 [ 1135.941925][T25254] __x64_sys_ioctl+0x73/0xb0 [ 1135.942817][ T3873] kobject: 'loop4' (000000001668f500): kobject_uevent_env [ 1135.946568][T25254] do_syscall_64+0x103/0x610 [ 1135.946603][T25254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.946619][T25254] RIP: 0033:0x457e39 [ 1135.946638][T25254] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1135.946650][T25254] RSP: 002b:00007f4bb1871c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.946668][T25254] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 1135.946680][T25254] RDX: 0000000020000040 RSI: 00000000c040565f RDI: 0000000000000004 [ 1135.946692][T25254] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1135.946704][T25254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bb18726d4 [ 1135.946724][T25254] R13: 00000000004c2f85 R14: 00000000004d5ac0 R15: 00000000ffffffff [ 1135.961620][ T3873] kobject: 'loop4' (000000001668f500): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1135.965464][T25254] Kernel Offset: disabled [ 1136.051692][T25254] Rebooting in 86400 seconds..