[ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target Timers. Starting Permit User Sessions... Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Regular background program processing daemon. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. Debian GNU/Linux 9 syzkaller ttyS0 2020/08/01 14:21:16 fuzzer started 2020/08/01 14:21:16 dialing manager at 10.128.0.26:42693 2020/08/01 14:21:16 syscalls: 3270 2020/08/01 14:21:16 code coverage: enabled 2020/08/01 14:21:16 comparison tracing: enabled 2020/08/01 14:21:16 extra coverage: enabled 2020/08/01 14:21:16 setuid sandbox: enabled 2020/08/01 14:21:16 namespace sandbox: enabled 2020/08/01 14:21:16 Android sandbox: enabled 2020/08/01 14:21:16 fault injection: enabled 2020/08/01 14:21:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/01 14:21:16 net packet injection: enabled 2020/08/01 14:21:16 net device setup: enabled 2020/08/01 14:21:16 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/08/01 14:21:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/01 14:21:16 USB emulation: enabled 2020/08/01 14:21:16 hci packet injection: enabled 14:23:24 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x40, @dev={0xfe, 0x80, [], 0x3d}, 0x4}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)="868a99659160b8b3716a138c4c9ff0dd58e246d9ba1020316b4c47513ecc48a83366850cb28675cf62c910", 0x2b}, {&(0x7f00000000c0)="29c9293e9b79ad8e2ca8", 0xa}, {&(0x7f0000000100)="65e1c8481dc9b84a665c7a4f1f68b0d64c2b269060d03b71ee0859f69691e283046dbb562c89c735f6074105f1429f58461769b244f9d315d1a8d696f659122a4f196a8595a23ce83c2613e581d16a308f9cdb5a1e8549522789fb3f9cd8e32e8fec8e365e7b2524274f4f70f8652fffe23b84a65dbd2aa5814cdae126f56ab7f20f6f8a78db0e091343690471cce3bb8ac234e562043c7c210ed6037b9e1c07a56cda2379a473d700068e63c5253a9487c0e8cd84", 0xb5}, {&(0x7f00000001c0)="9275a18bcdf5341042009d760b0c338a5ebfe12fa6c9bbcb41c1ded2601597bc7dcdcfccaa52aeab8111ce2921", 0x2d}, {&(0x7f0000000200)="1eeac4da3258f48f1bfe73454552506ed861cdb45a1f928bc0599337aeb630aa67be7775b69ba6b59e010300fb3dd456a3a2d94c1c120a7c8c9e1be9ba58c8754eafc97e7478164d23bfd0fffec0cbfd1e34cfa6581b184325d623ba967c729b24f6015c83bb083333a7922ca317eb382e720fc54e6a782e52c2fc77ce0326b4414dedf08e40e8b197", 0x89}, {&(0x7f00000002c0)="0bc60583845f38112136ffd3e064ba94916296ec8cfa3d3aceacddfe3abe0570b008d100f002cf8073f685e80433aff663abaecc12528eab28cecf3e7c3cea494513acb261e9cd13b5aa21e87b1e7d5550bf3961", 0x54}, {&(0x7f0000000340)="3878cd46dbd354d3ac22f25e6c3ee468b1c61de16bf111cda6aff9d047b5895fafa9e1c6d5de7845732d02e396514793be030ec3109a11b539a7074d6e1c469f6f8db9e453e368bf3f6cd3ed182cd27e337f57c8afe6fb772f8785d63ae7035a8dbd862596c82c8ff8419d9fa1305fd0fbea", 0x72}], 0x7, &(0x7f0000000440)=[{0xb8, 0x112, 0x5, "aa9e09212cd6cc3000ede4d418ec48b322aa4b51706d14fcefaff55c615295a9c12f2dfe41c45979525d48097514bc9a43848170c3ed1f53a6d1ded2fbfb8ac5652a53c08e45ea4a16ff8e6577689462903493e1d62c17a5439b13ecf10d2703e85152de261584df8ece7cacfdd5560d922b840bfd5e2a0a7349c56b38d402b05ac579e4a9032400c4db127a64bbae0b14992ee28439ea42df4c8830fc71afa8e8da7eaa"}, {0x1010, 0x101, 0xa9e, "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"}, {0x28, 0x11, 0x3, "3115f7fc67a7938b3fe4cbd514e26f01b71652"}, {0x88, 0x84, 0xcc, "aec0c3626e8cb4b4918be6fe82f265805d5dc35f89cea6bdb15d8b3275dc7297e4c613af0c4d8b5f970f0691c25d3e8668b6b45911eb1125d75fc2eb6ae8b7024d401e7f079eaf2e74e3d93ce5ea574a442dda2fa526c8adc62b629691fa925e358dfa84f006e14d36555852dab6f69aff0ca9590150f002"}, {0x20, 0x0, 0x8, "20fb019b6f42ec560eec759fd63e8d63"}], 0x1198}, 0x90) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001640)='/dev/zero\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000016c0)='nl80211\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000001700)='/dev/zero\x00', 0x12580, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000017c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x2c, r1, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c810}, 0x0) r3 = dup3(r0, 0xffffffffffffffff, 0x80000) accept$packet(r0, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000002cc0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002c80)={&(0x7f00000018c0)={0x1398, 0x12, 0x100, 0x70bd26, 0x25dfdbfd, {0x8, 0x20, 0x95, 0x3, {0x4e23, 0x4e23, [0x4, 0x0, 0x5, 0x5], [0xd7, 0x1f, 0x61, 0x6], r4, [0x64bd, 0x7]}, 0x44062949, 0x100}, [@INET_DIAG_REQ_BYTECODE={0x79, 0x1, "efff460c96675b061bca4948a15bb062ce74d4ef813703c1be914fa76bece9e925936501af8ca5717c431d74391cd3d92eb245699fd0a032ec405af02a8501cd7c9cb993150a3634e6b9c2a354f5290ee50acdfa2d6ea4d328c34c3b1908f9b3f5f9549fd89feae80e9da740c2257e294646f1a057"}, @INET_DIAG_REQ_BYTECODE={0x77, 0x1, "6de28cb48e3b77ddf3fc2216f5c367286ffa3e1ca380713453cf05e395a61c420c3dac4d792cde09992f1e54fd6a326f02292a3fffce093054f59e10c2338399439865142e98516e5a876c2ffaf1109e08d392b87e358c79500710e907cfdfde47c43a41b227d30317d60c1d78dcebfeb7405a"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "0360cf38427e99992d1ee9c2e069cdee0ea1d9790dbe192d426fd1dbbc54a83f09d2986b2616cce5b7e4470670bbe973c5c0c567d95f22e8daa9f1718e994aaa43fb09d101061b3bd9d4031d80ee9d99a1f547025ad1bf478238c2a57c"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "cc5cfa1ec1c0ac8d6735de4fcca4218dd451ed84afa7e2908b62991fecc9beb8e352fd539f24cfbd03dedbb75a650024a11ed60c5a05586826bedc7743e406525d7940647023a1daeb5d842968441d3a5cdb37aeae890573062150fecd00aaaf63d66cba45a1442339315356f558adac213fa3fe7e649c60a741b638ae017a7880d044237279672273941217e2ab2507458579aefee188d493d5c3802f065219f225808b5a5182768d008bfb77fb2eaf8cbed50ab122fd202b2aa82ddbdf812b3364bc80c0d39bccfe9221f1d0700e54372beed368763b9737304cab0c3af358838b61fa5502874d41c5550ab0e71c07fa70154332434f7e17921c22897c8003f9732e12de295badb2a5c3a4b45e590cf697a542bf1d710f5bdc0aced003a8e24c65a195f09b91cbb61ec79bce786e3034276f718dbcf8a8ecb52345562b053310e279c736df0726e4c378708d4d1a3a38163ce3b9654cafc0f52a7f56d6e9f0631f2873c8b683b968ff75f0d76ceb92bd007eac7c6b206d6a8023f3ae2f3e77ec48b210e10b182a9c1f1faa35d117703ce8f9b31eb1960ba3e5c966e6e88ebaad61c786ecab2f020071de5caf4e5a5083259583b4849082449631e0f1160cf1e2105819a316362bb87d9902b4470f7c1d4403c553528c19028b0c72f8e05a1524160a3597a3b7edbf0a34638118586c346e8a193aafe4e2b6bd7bb20e10b65549790aae70512c115e815f0a302b56fa11b88c5b544efb3669064d02ae86f6c4330d648afaa465778016c67e9390c910bcab888a6f9a8d025a4f6971dec98240313b42ab4b61bf1529da53bde64c73088de2a1c1496ea2aca37de06e6e9329e7963234fea465f2b4e59e45f6237764bd4250a4d71aaa460e1b021e62b99525cfe4bb541ed14c28234b45377e58af54e096c2550d1639743ee87996628e3b2375ea7c4c69d6bf8b8268270e31aa0422eb96e510750ff11e35235170ac5d59fdbe27f0dfda24f9a8cab498ed26389ec22e30860ed67d3f77dd6d6fb648042fc08f4c6167763fbb75ffae14a3ef1d1de89f9a9dc5091620784bc3828a6469d4324a92b4f9e46abd2671e342b9f3ae3cbf42131f83bcd06d71583b07ae3beab256895ece384d2ff01bfac98bf71d73bddb2ef021e1cc01353b9ca8ccc2d2b887e84c9b1ea5de8cf7e7cec8af591a59fbd17cb1467e75ee9ae0d7a745fddc3a664f6c7bbcf47feaa41c5452662295cdc8a0207f3c75f41b15754e90f06c15facc5ab023e3e59472ac76fc2de29deddb28c55af6542ce1dac9f514d96f8a8ea95ee265c2108a8bed1d5f580161e924b0a9765c8b266005ce236f4c7893a6640893f4850bbe58d82c93aa86349942471948ecbbbea69d5c454567124ad78c9c557616ae77e297f0e2956a13fd8c19eb191ca0fd7745158527d5c618e4787a8ad7acd895016224b2b4452378bda1de3ab2c425b56f2737ae69fb3f6b081422aa0aba2da2536b3927d206992ad5d50a6383f92e73cd62938ca0bb0a1d85d6fef0fecdd2ff44fb567870b923faa6dc2f43ea10f41dba2637e08e71da9d8c4362672a0f501bf5bcf5efc71bac3f5806502d0890616125081749cde5db865ba068d01bc38dd32de3c77098808df564566e00a5c3dc175bab6d552effafd04c97547bb75d69f695390078439adf1eef2d2d70da1c666f4763d1d3fa8fca02d6e2d058b8d9910c8fc024046bc1d754ebbd89cadc6c5036d6af96738373a1c58853fbfbdd3e17d17613c46ea96e69b2578256e44ba957ac71ccf0ae2956d4538c94efa8273d918b79c3aeec45b3572e40f3a9258ef9986e7b12d834a4d27b46ca2d4e3c94af834ca54f015ca711c6f303f53a5b49cce95d296142b6664ae407998c1d0f9343897ad535d8d24715bbb83129c51c0ee66d6d9d0a046d99e805e67c314199181c5b86d1b40aa29eb4e3bde0453710a4ea52643a7978c55c3873e84607413ae05e19c02f5e564739e8dfa51252bedc8df7f17df40eb0c8a6d41c35c1262826888e0f77360189fa4d16ce7780a5b1ad7688d91a3d13aeee1323728663ed0967d72989e22c3be2bb7716e41d69f8779d2058f9114804b43f1ae00f674557d28396371c741abc440920f970cfa82641d724a2980d26a3f49f389e834322e110ff432d0f19bcfb58ddcb89afd6b476b89f529d991db1dac97d0fb4ffd0c2e757b1b8837fa32dd4eb04c74e59b0e00c756784816a42f243ac47a20e2410cb8f918fd25f7b6040c052254cd05de293b377362b344000c0eabb00a80d2ea030acb39cc9e67c6fd0c1bcb9b3bc61c2885b6cf35e3dd2cbad0962749ddd1febd103f041cbd28ca5d073a04bccf66349bd516bc4340ed2e722c3eaf6034405657b1042bca960f636794b872082c9cfc212f16a13377dabca9d6ee2186c27b35bbbe20ddbbdc7a3ced73202750abf62cb8db41a12f7398baeeb4385b0a1539d3fbed1c99360ad2b27f410754dc0a8d574beb3587847724f781f88127308cfc9bc66fca1f8348d992e46261b383a17bc73704f52ea1baa9d567c8ecf526d968c85b884ce7079e3a929ddd6df343ee609ea8d4bb1341e09ba5652c3476e786814e204dc0852a69b52e055b7b155b50bc17b932174dd39290cec2c306e7c7b2024ea76825b9f74bcbfbac46ed600b3ff3c6f93dad141966155f781a9f5608c2e032befd69700a3e18a781baf650a8663d123e10b5e390eb42fb607132a0795b1fdfdd6da60ff08bd89a71cfb95310cbefd378e402d51a317ce93417eb8210987b04bf4538a833092037d7fa81080cc4fe594a0f2f2b1c60f2cde474ff85fae7ea7a9d3ceeffb7011f9bb0c418bbf9980f8af927cad578a522b2036a5d91b21dcdd979be6dae00757ea867aa9835f89d7464a6117a918810da8d742f5142e5cac9d20607ab62a14a58cc9925f49466951b3f57e3021efc973f4f22e9216f9144e4e4e4260cf486c3b7dd41297cc6867e838bd0845b32df53fa978834957eaf4384fe45da321b80a4842c9e8850e3a052af6d8612f22ad3c0eda71948eece5b4b3d0fe56eb8c8ac4160483cb6daebdafe6dfe438643d1c810d237dbbc7f60719aa749cb3739b309989147076593876d8f39391b04e118b3349be4992d7fb3d3f3a5e2de341ddf6371f869e55fe376cdd6a4938a76047e8c1035db186e21dae5eec3ab6979134be8353b5fc52e89bc45611c864fa3e93230a43f81c7ef7378e039fe573bfd53957b78189a56bbec65be5f09ff08805fa115db32188f45dc1ef863d32012c6ff366e025dc7f09446b1feebf782ad47b8cae639f54780d1810ea9a069171c747c4829df59ae902a3dfd6a1eac30c019bd916babbb49d5c240bd53731a49eb9aa3ee7ba8e6df09e9f829101b1abbf33b08d3d62a89fbf57b7d87bd092b0af5c30a09b91e537b74774c22accbd9e5d4a071faa937e6c574713db2626c4c8e3c040b7e4b7d4ee78346d1dac13da2607be2850d459a57641a1e5d6b397fcde0a140ced8548f20483b868d7af3d7baaf208b58374578d1708474b5fc49be196390f3f61eac94c7b7861ececa4122f101cc2f5ca4272b309bd0f7def3176540f9e3f5b3e9ce194eb15171428434d00d674b4ed26dc6e8615ca2324dfcfe2953c934312892aa36130a03105dd8e3e6bd1d3f41f21ba760c0323cf01a41a9d95694bf9c376fdc05c5a60b998d7a96b92b623ee759e4ed5c815d18fdbbe01b37f815ef3db7ce06da5422f47df8394ad7e7b06b563c2bff56366afe5b3cedf3e9fd10b39eadaa2e2ef71311ea1fe42cc84882ee07d1f690e86d865495e6dd7791b0ce1bd194f8be611537eee147b420e5e82d129746dac23604c72c28b5711e562be84abdfe15a1d9b6e5fc6af1fdbde8ed43f3936ba299422639911a44e8c630e7a00dd943f488a5b10e275f5080faa7ac5ce9e4d5be3f8ecc9374057f3054e87cbc48f5d2663cc87247f1748f3c72409e5bfec50e671e69fde7eed1252687eac2ebab692e35efcf5246ac95b91bd3a2ccee4f48bfb4a2d0113b6824eb43c7b7922696428dda50d2c08560b6bc6fb2c65fa648a8de78041b978d857f127db49510676f827cc56d05e6d818f5537a3f2526f0a64eeedda938f2d368c09cf0ad2df80a875a9caa3e4d1e36ff451d2bc9eb6c9a687c6993d4136677f492f8b98495df65075a400bc5ea970db0829340fc13c280d7d97300a479aafb0a3f9e9b274b3fc3b7b675c283b9050eb11441d58c39021f234381c4302bc5bc6169f2af06e8e3d306fd9d14c0fcbdaab0dd3cf1b4a016bc408fd3fd3c7f6b257f6511c2ed3735e860f553113b7e765fda45e0407e0758e89eddf327f0942c8c665edfc8bc40313f9ccdad62f64ea2296e7c5c28fe4289e366f39063aeb13fe6cb6281f2c9ed065de245575c596a97a74a26ff2c66b8b95e45f2e6b505916ea18d3fb9c3c4f3b0339bfc82ac8152cce90ec803474db1fc5bb631f043bdce52991a56e251a392fe6b31ded19903bc3305f3c6a970d76a4b274c8976341afe8f5b371996b70520701c36afdc3599a9c97211821d9f72bff81e5c514f3d585747affb7c72be78f439a1ce9f9779eb089c9f690278e9731f0b9b29f3e27518ca140369fe0245bf7949c5bdd0fdafe3374ee7a6715e1f775f7bd1eae8f43e0d2e831240a7bab493656e329de578925e41a75a16b71942a8c554487fb7d01547304592789fb70e96a9ff93968ce3a501b78a28f7584c9da1998424d3086036a52c783343b3551259d5e287bcbae819195fcf67462be37caa7649f032b7f386db260e0bacc9674414d374f2441859237d77e960260c7c3c14635fbf08aa5391067f3aabca33ee8b3200ada7b4d467d01310150f2ec372b5f460814da3e183847924f7ab3aef1a61387990d179da63c716eb83f011e389497d54c6b8b51527e04131375ef123ffc22483175790c926ac333f3f50954ee6a1e3aff4dfe0ad6d30b2eddc056005f326076b1982f5b6ae10b236f113587729cc211c13b2321764c1c349af338a9f3ad2a546b4732c2ae4ba18942c3394e3e8b6c855f6360c00f62d0c094ca199a552408de8891bfee57a63ce5c4ef6b6ca654337a8b912e7285113d0c763eb82e9f75386957c9b22701d213352c7391080a519b27092330780b8248884853ecc57eed0b3d05ebaf585d92f054175e8518d09e55b7dcc03c0474059c7aa044fbef5c5387c45a2fc7ca60d59dfa8a89928165cecddcbf4149b554806814306e061a0b63ca30ace63830b4ddcff00cc31d22a1b7119e1c7d6d4608f6968758d012fcba75e4d2d9862b537b1a9331e2a3626f47b4d7410eecd89811ce47a85d849b777909a44d21b26aec23670fcf5e3dfdc0986da905292561c6bfab90f4192282cef3e2eeca1285a621e5d0e7b8ccbb0b5982ead829d6500c47b583d11504417b0179261ab0207b4d5938ad125a898b5b4029ec55f8973b31fe15a932de26fb8f4b90014cc817e76f3d4d8344b1fbf0a6cd1097ea2f267578416ae2a4fb66507d0cb35488f10a32028802306663fee9bf5e5aa97a61818ce62c5ab106f4ae3ee78188b908f4b016290b3ec420141c2fb980b9376c1f07a75f4dceca27657ebfc5c7d28b6c2b043a0cf836e516640ba4d1c552d60b2fcfb011b86921902fd1c68fb497e20549ee41bff2d940cd141e5a31dabf7cbb1acec910d08d8b8286dc9e46a158fad4e21c8a391f1612ff49f94f70d2a3d950ac62fbf183246af95e4912ebee67abf4421341c30703301a48331a40"}, @INET_DIAG_REQ_BYTECODE={0x3a, 0x1, "9ed6f8a0e9e3fa2ebbce4b55a4330a9f505d9fb179b7c40b0d966a6c986119fd1f85242d43dbf01bdf8bba728a630791c7979bdf21cd"}, @INET_DIAG_REQ_BYTECODE={0xeb, 0x1, "53130e033b09e68a69b8dfa53399997b3aeb56765938268d0c6ce7bfa09fbc9720d9e7556bf311ebd3f0fb2e17841483628703f3417b3ed39797cbe419ab8ed5bb349486df88ae1c7bd19753d55e59f5f1a1c4e9bacf6120e1ff53d90fc7d0196eb2764f35b3187a7f6e5eb8f76a50b25d13101a7e096e4b5976a78d56df6052ed99e2092b4534f775ba6d581a4a8e2d47401649959470a52a850d106e1fac7025d69323653f8ea07e272fb7ff6a7c356d09fc929a2ca561f35b052267348ca6794a10c08087ccfd99b872194617fb30485e91c161f15113331bc59e902a15ff2de642f678e96f"}, @INET_DIAG_REQ_BYTECODE={0xaa, 0x1, "850f7310e582cc680ba98b3d123a2d19a023281b8f8d2df28e56477016e6c3722a76e4d61e2593aa5ceeb67122849bb18d1c845464c2a783a0edaa5e2270293aa118e3b2d0fa62a2c52bbefe2e7a868957ad01d95b1f3e243f91e70575bec673653b9021844b7bf51cd632612dcc87f9a26ff0df20c83a61fc3943c5dc66a4561c7a24a160bca951beb548e1e36c487756c4fa2dbe949d00ab6320514d25e675d8681a5ae14a"}, @INET_DIAG_REQ_BYTECODE={0x1c, 0x1, "89d79d119a03c59a6648bda9e3623bcd9004ccd536f237dd"}]}, 0x1398}, 0x1, 0x0, 0x0, 0x80}, 0x80) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002d00)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000002d40)={0xbc0, 0x1, 0x1}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000002d80)=0x2) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000002e00)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000002f00)={&(0x7f0000002dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e40)={0x68, r6, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0xc884}, 0x24004800) getsockname$ax25(r5, &(0x7f0000002f40)={{0x3, @default}, [@bcast, @rose, @bcast, @netrom, @default, @default, @null, @null]}, &(0x7f0000002fc0)=0x48) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000003000)='/dev/video0\x00', 0x2, 0x0) fcntl$dupfd(r7, 0x0, r0) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r8, 0x29, 0xd2, &(0x7f0000003040)={{0xa, 0x4e21, 0x9, @mcast2, 0x8}, {0xa, 0x4e23, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x3}, 0x4, [0x5, 0x0, 0x7, 0xffffff00, 0x80, 0x101, 0x1, 0x70]}, 0x5c) r9 = pidfd_getfd(r8, r7, 0x0) ioctl$EVIOCGID(r9, 0x80084502, &(0x7f00000030c0)=""/192) syzkaller login: [ 194.009779][ T27] audit: type=1400 audit(1596291804.631:8): avc: denied { execmem } for pid=6857 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 194.186844][ T6858] IPVS: ftp: loaded support on port[0] = 21 14:23:24 executing program 1: select(0x40, &(0x7f0000000000)={0xf784, 0x8, 0x5, 0x44b8, 0x100, 0x8, 0x6, 0x1000}, &(0x7f0000000040)={0x43, 0xfffffffffffffffe, 0x2, 0xfffffffffffffff8, 0x4, 0x7, 0x0, 0xc6cb}, &(0x7f0000000080)={0xc16, 0x72, 0xfffffffffffeffff, 0x4, 0x101, 0x0, 0x3, 0x9}, &(0x7f00000000c0)={0x77359400}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x8140, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000140)=""/250) r1 = dup2(0xffffffffffffffff, r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3aa7cee9d73a3fcc6b8845fa578f6f3f3c1d0b35f3fc02d0b9e347e17a6ff2a3ca0c3e8f33fd1b32a3820c9556b839f910cac83082de1f83d61bcba8e425527635c4d9129adfb654e7cfacd8dbe224faa6394a47475a860468a002c5174c79232c0e1fa149b564acc30f112da251e7365665fc81f7080bf51edaad32675246c30b0a6ce92806b0ed4afe91776bf3acb098579e00aca6d370be2a82f32dd7ab128c78aab79b8ba8e21ed08bc1343f0ce4cfbb99e3f876611e956d5992e351308c16b8c7b61ba191a5a55ebff04a17d974dcad", 0xd2) shmget(0x1, 0x1000, 0x54000000, &(0x7f0000fff000/0x1000)=nil) inotify_init1(0x80800) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000340)={0x2, 0xb4, 0x3, 0x80800, r1}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockname$netrom(r1, &(0x7f0000000380)={{0x3, @default}, [@bcast, @rose, @null, @null, @netrom, @remote, @netrom, @bcast]}, &(0x7f0000000400)=0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r0, 0x28, &(0x7f0000000440)}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000004c0)={{0x0, 0x0, 0xbc8, 0x3, 0x605b}, 0x20, 0x1, 'id0\x00', 'timer0\x00', 0x0, 0xfffffffffffffff3, 0x40, 0x1, 0x8000}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x4001, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000600)={0x8, 0x401, [0x40, 0x7, 0x907, 0x200, 0x8], 0x3}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000640)={r3, 0xe24, 0x1f75, 0x1}) write$cgroup_subtree(r4, &(0x7f0000000680)={[{0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'io'}, {0x2b, 'io'}, {0x2b, 'cpu'}]}, 0x2e) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000700)={0x2, 0x0, 0x0, 0x800}) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f0000000740)={0x9, r6, 0x1, 0x8000}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000840)={0xb, 0x10, 0xfa00, {&(0x7f0000000780), 0xffffffffffffffff, 0xffffffff}}, 0x18) [ 194.337672][ T6858] chnl_net:caif_netlink_parms(): no params data found [ 194.412133][ T6858] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.420488][ T6858] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.430642][ T6858] device bridge_slave_0 entered promiscuous mode [ 194.441689][ T6858] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.450025][ T6858] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.462684][ T6858] device bridge_slave_1 entered promiscuous mode [ 194.489368][ T6858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.504398][ T6858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.547551][ T6858] team0: Port device team_slave_0 added [ 194.565287][ T6858] team0: Port device team_slave_1 added [ 194.573672][ T6996] IPVS: ftp: loaded support on port[0] = 21 [ 194.626210][ T6858] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.634134][ T6858] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.661943][ T6858] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 14:23:25 executing program 2: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000000c0)={0x1, @win={{0x81, 0xd55, 0x9, 0x7913ed73}, 0x3, 0x7fff, &(0x7f0000000040)={{0x8001, 0x65e, 0xc5f, 0x1}, &(0x7f0000000000)={{0x0, 0x20, 0x0, 0x6}}}, 0x6, &(0x7f0000000080)="6fcca567f1"}}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x2, 0x100000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x8001, 0x100) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000280)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)=@v2={0x2, @adiantum, 0x3, [], "e140b23542134f32e0e48f816d56b916"}) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0xe7, 0x60480) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f0000000340)={0x0, 0x1, 0xdff, 0x3, 0x80000000, 0x0, 0x4}) r2 = openat2(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x1000, 0x11a, 0x8}, 0x18) setns(r2, 0x0) r3 = open(&(0x7f0000000400)='./file0/../file0\x00', 0xba401, 0x161) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000480)={&(0x7f0000000440)="a85ad4034981c305ec558f90fb69a03c8eff13", 0x13, 0x2}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r3, 0xc01064ac, &(0x7f00000005c0)={r4, 0xd3, &(0x7f00000004c0)=""/211}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000640)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x3, "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", 0x1, 0x3f, 0x8, 0x7f, 0x7, 0x81, 0xfc, 0x1}}}, 0x128) ioctl$USBDEVFS_FREE_STREAMS(r1, 0x8008551d, &(0x7f0000000780)={0xc6bd, 0x5, [{0x2}, {0x9, 0x1}, {0x7, 0x1}, {0x9}, {0x1, 0x1}]}) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f00000007c0)={0x0, {0xd54d, 0x22, 0x1ff, 0x3}}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000800)={0xffffffffffffffff}) getsockopt$XDP_MMAP_OFFSETS(r6, 0x11b, 0x1, &(0x7f0000000840), &(0x7f00000008c0)=0x80) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000940)) [ 194.685429][ T6858] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.693938][ T6858] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.721427][ T6858] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.826236][ T6858] device hsr_slave_0 entered promiscuous mode [ 194.882675][ T6858] device hsr_slave_1 entered promiscuous mode [ 194.996751][ T7050] IPVS: ftp: loaded support on port[0] = 21 [ 195.031015][ T6996] chnl_net:caif_netlink_parms(): no params data found 14:23:25 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2801, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x1, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000040}, 0x805) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000700)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000001c0)={0x4e0, 0x7, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_RULE_USERDATA={0x80, 0x7, 0x1, 0x0, "072d3840977ef038ce91554c712079c987161913551a0d19e730d1256806b9f4e1c170054927bb96150e8e3e852421a06b5bd659f400f06e953cdc5144733c778f5b635f45eedef715d5096fac7a5b025f33e8c16b618199082eec036ba486316d6d25cc184806738e7898f4983caf0fd4781533b8f3d6fc5ba01720"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x414, 0x4, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz1\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x15}]}}]}, {0x258, 0x1, 0x0, 0x1, [@objref={{0xb, 0x1, 'objref\x00'}, @void}, @reject={{0xb, 0x1, 'reject\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @void}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xa}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x20}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffa}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1f}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x20}, @NFTA_REDIR_FLAGS={0x8}]}}, @fib={{0x8, 0x1, 'fib\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x32}, @NFTA_FIB_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_FIB_RESULT={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FIB_FLAGS={0x8, 0x3, 0x1, 0x0, 0x24}, @NFTA_FIB_RESULT={0x8}]}}, @bitwise={{0xc, 0x1, 'bitwise\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @val={0x11c, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_MATCH_INFO={0xd3, 0x3, "4e3dcb33ed952a56ba4b0b70114b2a091d389b41068be9607d79e2ce141dbcc2829e6a9b5497732e0472a444c83ebe49d990c8db265273cf9f7a210ca1b63a619966ae40191605965482461f3d8adbc04a242bf557b3e9a9c367d3ebff79db7dabb1bdc8bb628ee83a3a82e4fe672e6099bb4f7541c0a59ed45b016388b84a94a8ab9a30d1f36989eb1b80d98307159074ae1acdf17752b9f587460550e5b0aabbb695483ca337dc6d82c3759f977aa6813a1af8c59666d27644f9c685411ae921b8b5f55fa6ff647767fef907e9ce"}, @NFTA_MATCH_INFO={0x1d, 0x3, "45fd3f221fd4d2c5382357879b381e13fd7d3254beb5985805"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFTA_MATCH_NAME={0x9, 0x1, 'syz0\x00'}]}}]}, {0x40, 0x1, 0x0, 0x1, [@quota={{0xa, 0x1, 'quota\x00'}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_QUOTA_BYTES={0xc}]}}, @xfrm={{0x9, 0x1, 'xfrm\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @void}]}, {0x8c, 0x1, 0x0, 0x1, [@hash={{0x9, 0x1, 'hash\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0x6e}, @NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0xc00}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0xa6}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0xec}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0xca}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x8e}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x76f}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x9f}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}]}}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x4}]}}]}, {0x50, 0x1, 0x0, 0x1, [@exthdr={{0xb, 0x1, 'exthdr\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x51}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x83}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x78}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x77}]}}, @reject={{0xb, 0x1, 'reject\x00'}, @void}]}, {0x1c, 0x1, 0x0, 0x1, [@xfrm={{0x9, 0x1, 'xfrm\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @void}]}, {0x10, 0x1, 0x0, 0x1, [@socket={{0xb, 0x1, 'socket\x00'}, @void}]}, {0x2c, 0x1, 0x0, 0x1, [@meta={{0x9, 0x1, 'meta\x00'}, @void}, @cmp={{0x8, 0x1, 'cmp\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @void}]}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x24000851}, 0x811) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000740)='/dev/nvme-fabrics\x00', 0x800, 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000780)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000840)={0x9b0000, 0x1ff, 0xb6b, 0xffffffffffffffff, 0x0, &(0x7f0000000800)={0x990a69, 0x0, [], @p_u32=&(0x7f00000007c0)=0x1}}) r4 = openat2(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x91, 0x10}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000900)=0x52d8667f7b79af7a) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000940)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000980), &(0x7f00000009c0)=0xe) fcntl$getownex(r0, 0x10, &(0x7f0000000a00)) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r4, 0xc0845657, &(0x7f0000000a40)={0x0, @bt={0x5, 0x7, 0x1, 0x6, 0x5, 0x5, 0x0, 0x81, 0x0, 0x2, 0x9, 0x5, 0x9, 0xabe, 0x12, 0x2d, {0x5, 0x36d}, 0x53, 0x8}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000b00)={r3}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r7, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x100}, 0x40010) getpid() r8 = open(&(0x7f0000000c80)='./file0\x00', 0x88140, 0x150) setsockopt$IP_VS_SO_SET_FLUSH(r8, 0x0, 0x485, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000d80)=0x4) [ 195.266240][ T6996] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.273959][ T6996] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.286388][ T6996] device bridge_slave_0 entered promiscuous mode [ 195.296597][ T6858] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 195.356512][ T6858] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 195.407392][ T6996] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.430221][ T6996] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.452939][ T6996] device bridge_slave_1 entered promiscuous mode [ 195.468273][ T6858] netdevsim netdevsim0 netdevsim2: renamed from eth2 14:23:26 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r0, &(0x7f0000000040), 0x80) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x100, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)=0x20) ioctl$TCSBRKP(r1, 0x5425, 0x10000) r2 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x22500, 0x115) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000200)={r3, 0x0, 0x2}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/msg\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40007000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x1, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [@CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0xa, 0x1, 'Q.931\x00'}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x48014) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x2001, 0x0) sendto$rose(r5, &(0x7f00000003c0)="e89fd79d3d0f974a24738fa9bff7cc8c8bf5809ab4fbd55ee75c2ab0e37d31", 0x1f, 0x4000, &(0x7f0000000400)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) syz_mount_image$erofs(&(0x7f0000000440)='erofs\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f00000004c0)="0a2c2a846ceff8864998c9a091180e871e2fd62a3b0b1999633330b9c17f9a6f21d0f9a1a22511320324e7980923924d9b2da0100801e132473174e7f42da3cec93fcfb8f59d3bfb085112304f1c3a17a4", 0x51, 0xe8}, {&(0x7f0000000540)="8745813863594b0373", 0x9, 0x31}, {&(0x7f0000000580)="e4ae1ffcb92f6d67253316d4a35473d96e0a0a4f95106ea837b38f554eb927e29c38fcf4b640ade4dd48036ecab7b8c706fb328db5116bb58178849e95effb9c3609eff16d961d4fada5397305c6d442e445dc6016c3c8a7b5d33fe8105585ed9a75050b963fc04aa16a21894f1b1ce714f0495d407c788f3f8f208d3b6523b7b41d2c7d22cc1a8e0adffadb0229efac674cfb1797043a5e46621eddbfb58bf01c7b2118e6720ee546aa35b012721f88ad5b0568017f2196a78d4c38c61e568297eb652275caf5d7364d9d21aea1597b9009d5765f55339d5b46344f1d86280058c84e40674aaf09dbfed0", 0xeb, 0x78e}], 0x28002, &(0x7f0000000700)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x1ff}}, {@acl='acl'}], [{@fowner_lt={'fowner<', 0xee01}}, {@subj_role={'subj_role', 0x3d, '/proc/capi/capi20ncci\x00'}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000780)={{0x0, 0x0, @reserved="3357c00c60ca2f781d935ec32cf43572f39d22edaeac560350e125b7d534a878"}, 0x24, 0x0, [], "5a70c7a1dbc091551eb8f37e5b7b7c408b9324057dc1a06f19aa948078fa6e5481ec353a"}) r7 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)='erofs\x00', 0xfffffffffffffffc) keyctl$search(0xa, r6, &(0x7f0000000800)='.dead\x00', &(0x7f0000000840)={'syz', 0x2}, r7) socket$inet6_icmp(0xa, 0x2, 0x3a) [ 195.533935][ T6858] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 195.627551][ T7221] IPVS: ftp: loaded support on port[0] = 21 [ 195.696011][ T6996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.782702][ T6996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.857996][ T7050] chnl_net:caif_netlink_parms(): no params data found [ 195.871805][ T7264] IPVS: ftp: loaded support on port[0] = 21 14:23:26 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0x80000001}}}, &(0x7f00000021c0)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002200)={r7, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) [ 195.927065][ T6996] team0: Port device team_slave_0 added [ 196.002811][ T6996] team0: Port device team_slave_1 added [ 196.175625][ T6996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.184626][ T6996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.212008][ T6996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.223618][ T7050] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.230712][ T7050] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.239347][ T7050] device bridge_slave_0 entered promiscuous mode [ 196.255114][ T7363] IPVS: ftp: loaded support on port[0] = 21 [ 196.256280][ T7221] chnl_net:caif_netlink_parms(): no params data found [ 196.277495][ T6996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.285087][ T6996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.312274][ T6996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.332375][ T7050] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.339455][ T7050] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.350316][ T7050] device bridge_slave_1 entered promiscuous mode [ 196.415766][ T7050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.436695][ T7050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.505657][ T7050] team0: Port device team_slave_0 added [ 196.545260][ T6996] device hsr_slave_0 entered promiscuous mode [ 196.612902][ T6996] device hsr_slave_1 entered promiscuous mode [ 196.662389][ T6996] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.670241][ T6996] Cannot create hsr debugfs directory [ 196.688771][ T7050] team0: Port device team_slave_1 added [ 196.727606][ T7050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.737698][ T7050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.763789][ T7050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.779703][ T7050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.787273][ T7050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.814467][ T7050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.866622][ T6858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.936458][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.947354][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.972523][ T6858] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.979519][ T7221] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.991841][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.000112][ T7221] device bridge_slave_0 entered promiscuous mode [ 197.014271][ T7264] chnl_net:caif_netlink_parms(): no params data found [ 197.063679][ T7221] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.070797][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.079417][ T7221] device bridge_slave_1 entered promiscuous mode [ 197.115737][ T7050] device hsr_slave_0 entered promiscuous mode [ 197.172697][ T7050] device hsr_slave_1 entered promiscuous mode [ 197.212335][ T7050] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 197.219920][ T7050] Cannot create hsr debugfs directory [ 197.251799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.260671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.273548][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.280781][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.338208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.347462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.356966][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.365591][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.372775][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.429706][ T7221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.441280][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.499756][ T7221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.550818][ T7264] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.559408][ T7264] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.569256][ T7264] device bridge_slave_0 entered promiscuous mode [ 197.578865][ T7264] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.587052][ T7264] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.595854][ T7264] device bridge_slave_1 entered promiscuous mode [ 197.630588][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.645005][ T7221] team0: Port device team_slave_0 added [ 197.657765][ T7363] chnl_net:caif_netlink_parms(): no params data found [ 197.685890][ T7264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.697088][ T7221] team0: Port device team_slave_1 added [ 197.721685][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.731006][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.740032][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.765455][ T7264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.806654][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.815804][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.825882][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.834994][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.844590][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.853538][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.875409][ T7221] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 197.885966][ T7221] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.913975][ T7221] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 197.933118][ T6858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.947489][ T6996] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 197.997877][ T6996] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 198.067720][ T7264] team0: Port device team_slave_0 added [ 198.082092][ T7264] team0: Port device team_slave_1 added [ 198.088834][ T7221] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.097369][ T7221] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.123453][ T7221] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.143307][ T6996] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 198.205356][ T6996] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 198.345289][ T7221] device hsr_slave_0 entered promiscuous mode [ 198.392954][ T7221] device hsr_slave_1 entered promiscuous mode [ 198.442378][ T7221] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 198.449950][ T7221] Cannot create hsr debugfs directory [ 198.469838][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.484442][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.498505][ T7264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 198.506148][ T7264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.533029][ T7264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 198.572929][ T6858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.584302][ T7264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.591260][ T7264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.617378][ T7264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.705158][ T7363] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.713537][ T7363] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.721280][ T7363] device bridge_slave_0 entered promiscuous mode [ 198.776164][ T7264] device hsr_slave_0 entered promiscuous mode [ 198.832825][ T7264] device hsr_slave_1 entered promiscuous mode [ 198.892372][ T7264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 198.899946][ T7264] Cannot create hsr debugfs directory [ 198.913515][ T7050] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 198.966867][ T7050] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 199.025356][ T7050] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 199.067547][ T7050] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 199.124793][ T7363] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.131908][ T7363] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.140515][ T7363] device bridge_slave_1 entered promiscuous mode [ 199.205091][ T7363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.228652][ T7363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.286244][ T7363] team0: Port device team_slave_0 added [ 199.294886][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.307164][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.347058][ T7363] team0: Port device team_slave_1 added [ 199.420431][ T7363] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 199.428593][ T7363] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.458098][ T7363] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 199.512376][ T7363] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 199.519371][ T7363] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.546839][ T7363] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 199.599278][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.608457][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.618881][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.627324][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.674865][ T6858] device veth0_vlan entered promiscuous mode [ 199.736268][ T7363] device hsr_slave_0 entered promiscuous mode [ 199.794302][ T7363] device hsr_slave_1 entered promiscuous mode [ 199.832922][ T7363] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 199.840534][ T7363] Cannot create hsr debugfs directory [ 199.846554][ T7221] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 199.921791][ T7221] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 200.032363][ T7221] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 200.070361][ T7221] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 200.155909][ T7264] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 200.225876][ T7264] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 200.277970][ T6858] device veth1_vlan entered promiscuous mode [ 200.306181][ T7264] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 200.376295][ T7050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.383923][ T7264] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 200.500955][ T6996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.517093][ T7050] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.564082][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.572041][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.580691][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.589706][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.605230][ T6858] device veth0_macvtap entered promiscuous mode [ 200.655028][ T6996] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.661933][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.670669][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.679762][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.688722][ T2573] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.695860][ T2573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.704489][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.712445][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.720338][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.730277][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.738998][ T2573] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.746132][ T2573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.754760][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.767542][ T6858] device veth1_macvtap entered promiscuous mode [ 200.778241][ T7363] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 200.850791][ T7363] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 200.907884][ T7363] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 200.964589][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.973333][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.981934][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.991392][ T3861] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.998528][ T3861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.006378][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.015495][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.024967][ T3861] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.032020][ T3861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.040480][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.082432][ T7363] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 201.107177][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.116748][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.129540][ T6858] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.151630][ T7221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.163806][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.178679][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.187778][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.223439][ T6858] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 201.244905][ T7221] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.273812][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.285447][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.299785][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.308748][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.317699][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.326305][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.335167][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.344638][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.353311][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.361907][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.370545][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.379914][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.388902][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.397763][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.406932][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.415005][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.438633][ T7050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.463401][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.471505][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.480530][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.492733][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.500952][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.509947][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.518695][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.527536][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.536408][ T2515] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.543558][ T2515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.557613][ T6996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.593187][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.601349][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.615865][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.625747][ T2515] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.632856][ T2515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.748488][ T7264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.797491][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.807667][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.815420][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.823350][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.831975][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.841173][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.849894][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.857978][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.865880][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.886216][ T7050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.941212][ T7264] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.956045][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.968628][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.978313][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.993071][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.016402][ T6996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.054074][ T7363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.064500][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.075590][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.084954][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.094638][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.103487][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.110555][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.118606][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.127318][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.136270][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.143416][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.152046][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.165164][ T7221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.179383][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.209139][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.217667][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.227217][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.238450][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.268561][ T7363] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.280520][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.290234][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.301541][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.311616][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.320681][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.328745][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.336594][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.345099][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.399392][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.408264][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.421748][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.430816][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.443448][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.451787][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.465267][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.475580][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.486303][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.496989][ T7507] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.504120][ T7507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.518137][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.527737][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.543609][ T7264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.560127][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.586213][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.594560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.603649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.611360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.620711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.630268][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.641751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.650455][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.657572][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.665892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.690397][ T7221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.700001][ T7050] device veth0_vlan entered promiscuous mode [ 202.747027][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.754797][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.763338][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.771974][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.782072][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.792890][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.801047][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.811414][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.819893][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.830830][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.849178][ T7264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.870048][ T7050] device veth1_vlan entered promiscuous mode [ 202.885668][ T6996] device veth0_vlan entered promiscuous mode [ 202.896868][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.909422][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.939692][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.955121][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.964186][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.973350][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.982011][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.991580][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.017593][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.058212][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.066606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.081441][ T7363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.174407][ T6996] device veth1_vlan entered promiscuous mode [ 203.233608][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.254135][ T3862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.296607][ T7050] device veth0_macvtap entered promiscuous mode [ 203.349115][ T7221] device veth0_vlan entered promiscuous mode [ 203.375089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.394625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 14:23:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x1}}, 0x18, &(0x7f0000000040)={&(0x7f0000000000)='*', 0x1}, 0x1, 0x0, 0x0, 0x4000081}, 0x0) [ 203.463790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.496978][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.513785][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.569217][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.579197][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.607072][ T7221] device veth1_vlan entered promiscuous mode [ 203.620000][ T7050] device veth1_macvtap entered promiscuous mode [ 203.641670][ T6996] device veth0_macvtap entered promiscuous mode 14:23:34 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000080)={&(0x7f0000000b40)={0x1d, 0x0, 0x0, {0x1}}, 0x18, &(0x7f0000000040)={&(0x7f0000000000)='*', 0x1}, 0x1, 0x0, 0x0, 0x4000081}, 0x0) 14:23:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000980)="b9ff0300600d698cff9e14f008004de7f9c764362ae28e79667717032de9bda08b79", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) keyctl$session_to_parent(0x12) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0xa, [0x1, 0x4, 0x6, 0x3, 0x9, 0xfff8, 0x8, 0x1, 0x0, 0xfffd]}, 0x18) [ 203.743066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.751448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 203.771482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 203.781696][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.791583][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.803961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 14:23:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, 0x0, 0x4, 0x0, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}}, 0x4) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000000034, 0x7ff}, 0x51a7e, 0x0, 0x0, 0x2, 0x237, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000800)={0x0, 0x0, @pic={0x3, 0x20, 0x80, 0x3, 0x3, 0x0, 0x81, 0xf7, 0x0, 0x7, 0xf9, 0xfc, 0xf3, 0xc1, 0x3, 0x63}}) read(r0, &(0x7f0000000180)=""/19, 0x13) setresuid(0x0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r2) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="020000000100000000000000edff0000", @ANYRES16, @ANYBLOB, @ANYRESDEC, @ANYBLOB="020503049c75e53a38ca91c07abff1db0595430510988b867713301337abec72b3991183b008e362b36faf077599d669c8df645357d00403", @ANYRES32=0x0, @ANYBLOB="020000008b7afe7190419a242c90b8badd307c39126f8251fbae83abf5024b10bd282f8e8115ba16b3dabcfe4a1c348a688474ee82422917495373c0dae62219d7754ef8e121eb9ca2fef6332ad9068c2eebd2841560d77293ba0c8d7adb01de58d02d49cf03d93209b86c2fa237d4ce47bbfc480aebe46b64b4f3ed21da376d64c398019d4df612572ea4a4ac26570ab71e8b70a03aae6acff322abb06a98f8d163290b2128da89e65d9bc04fd5c80605eda064105b8fa6860e9a8ba612a7ccf25434d44f7ef434da92b403ca14a059e556f8f75f8dc30d399bf8dccf32afd017c0654a30e5e889ff08bc684b8bc144e038eacb687df3f5d2b16349ad52da34b12a18aed0a8e88a98c5b2fe09b8dda469a40fc4663736df2ff751272ffff458716048db7c3b32d85b370ba21828db2b16c7413c0b23c7d5346bf42811187b388046689f6e7d22f662b52fb39f2aed5f3de10f2258920a418a912f8a782bf77ca0f66d9d5e847f336b28444d533ad36c65c4ccff35cd5f836ae919eed1e58adf05fe59fff0ad2f4ae932415acef0ceebb6a4e8b03b5e1f621c784791258f0d2e7e83b8d2501db1526192e4dcde2d0c67db591e3e9dc2e6b94a7f43d39b0b51b096264179a96b39549039ca84c82bdd63c1", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020003009b05b8cabcd14ee20c22534e7fd465ae418b93a77ce1e41664022d41", @ANYRES32=0x0, @ANYBLOB="040001000000000008000100", @ANYRES32=r2, @ANYBLOB="08000000072ddbe3eb69e1b82e52306f7cd0240b8729fe891edf34b4088d067b4fe890e72aaa0117b30c3e3fe22473ff9ab09d2300fb805e72f228e7747c918de51585fe0502cf4aa0f837037f0717ffe5a0727d3829165b760bfca486a15b052ecb29b92680322346ce31d3196ae8e7f22f5ecb22dbb3804231", @ANYRES32=0x0, @ANYBLOB], 0x64, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) socket(0x21, 0x800, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0xfffffffffffffe11, 0x7b, 0x1}, 0x7) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000002a2500002509000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ed00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000100008000"/192]) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000300)=0x5f, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 203.834861][ T6996] device veth1_macvtap entered promiscuous mode [ 203.862142][ T7050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.879455][ T7050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.891924][ T7050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.907230][ T7363] device veth0_vlan entered promiscuous mode [ 203.945024][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.954604][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.970055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.980569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.993197][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.002131][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.011456][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.023923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.033840][ C1] hrtimer: interrupt took 33603 ns [ 204.040315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.054747][ T7050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.061182][ T27] audit: type=1804 audit(1596291814.681:9): pid=8148 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir995966033/syzkaller.wSQxKU/4/bus" dev="sda1" ino=15739 res=1 14:23:34 executing program 0: syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xa1, 0xaf, 0xff, 0x40, 0x1b3d, 0x153, 0x263c, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0xa9, 0x2, 0xae, 0x0, [], [{{0x9, 0x5, 0x81}}, {{0x9, 0x5, 0x1}}]}}]}}]}}, 0x0) socket$unix(0x1, 0x1, 0x0) [ 204.080549][ T7050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.103744][ T7050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.119229][ T7363] device veth1_vlan entered promiscuous mode [ 204.138891][ T7221] device veth0_macvtap entered promiscuous mode [ 204.161954][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.179259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.188068][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.204295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.216796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.226796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.235856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.268208][ T6996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.286866][ T6996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.297356][ T6996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.309139][ T6996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.321320][ T6996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.336358][ T7221] device veth1_macvtap entered promiscuous mode [ 204.347404][ T7264] device veth0_vlan entered promiscuous mode [ 204.362995][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.370926][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.380066][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.389408][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.403094][ T6996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.419211][ T6996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.429135][ T6996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.439899][ T6996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.451230][ T6996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.534418][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.544287][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.553331][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.561792][ T2499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.570580][ T17] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 204.579856][ T7264] device veth1_vlan entered promiscuous mode [ 204.619413][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.630975][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.646198][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.657222][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.668625][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.679586][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.692019][ T7221] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.774737][ T7363] device veth0_macvtap entered promiscuous mode [ 204.830790][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.838852][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 204.847573][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.856923][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.866358][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.878594][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.890425][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.900752][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.911806][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.922105][ T7221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.932638][ T17] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 204.945424][ T7221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.951082][ T17] usb 1-1: config 0 interface 0 altsetting 0 has a duplicate endpoint with address 0x1, skipping [ 204.958292][ T7221] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.016201][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.026841][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.038802][ T7363] device veth1_macvtap entered promiscuous mode [ 205.132552][ T17] usb 1-1: New USB device found, idVendor=1b3d, idProduct=0153, bcdDevice=26.3c [ 205.140197][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.141610][ T17] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 205.155022][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.172487][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.183919][ T3862] Bluetooth: hci0: command 0x0409 tx timeout [ 205.184622][ T17] usb 1-1: Product: syz [ 205.193218][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.195702][ T17] usb 1-1: Manufacturer: syz [ 205.212274][ T17] usb 1-1: SerialNumber: syz [ 205.212955][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.220828][ T17] usb 1-1: config 0 descriptor?? [ 205.238985][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.249535][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.260840][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.275487][ T7363] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.284742][ T17] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 205.298262][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.309855][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.324992][ T17] usb 1-1: Detected FT-X [ 205.329359][ T17] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 1 [ 205.349889][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.360126][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.372976][ T7264] device veth0_macvtap entered promiscuous mode [ 205.416914][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.429341][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.439901][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.450415][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.461037][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.471517][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.481725][ T7363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.493117][ T17] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 205.497696][ T7363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.519888][ T17] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 205.529315][ T7363] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.550421][ T17] usb 1-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 205.550741][ T7264] device veth1_macvtap entered promiscuous mode [ 205.590138][ T17] usb 1-1: USB disconnect, device number 2 [ 205.619488][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 205.627385][ T17] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 205.645876][ T17] ftdi_sio 1-1:0.0: device disconnected [ 205.645905][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.683386][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.692160][ T3861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.901830][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.942550][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.967747][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.979984][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.991936][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.006482][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.021041][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.033000][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:23:36 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r3, 0xffffffffffffffff, 0x1c, 0xa, r6}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffd}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 206.044073][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.064198][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.102887][ T7264] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.171304][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.184423][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.236834][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.262740][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.282316][ T7507] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 206.290036][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.312249][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.322103][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 14:23:37 executing program 1: select(0x40, &(0x7f0000000000)={0xf784, 0x8, 0x5, 0x44b8, 0x100, 0x8, 0x6, 0x1000}, &(0x7f0000000040)={0x43, 0xfffffffffffffffe, 0x2, 0xfffffffffffffff8, 0x4, 0x7, 0x0, 0xc6cb}, &(0x7f0000000080)={0xc16, 0x72, 0xfffffffffffeffff, 0x4, 0x101, 0x0, 0x3, 0x9}, &(0x7f00000000c0)={0x77359400}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x8140, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000140)=""/250) r1 = dup2(0xffffffffffffffff, r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3aa7cee9d73a3fcc6b8845fa578f6f3f3c1d0b35f3fc02d0b9e347e17a6ff2a3ca0c3e8f33fd1b32a3820c9556b839f910cac83082de1f83d61bcba8e425527635c4d9129adfb654e7cfacd8dbe224faa6394a47475a860468a002c5174c79232c0e1fa149b564acc30f112da251e7365665fc81f7080bf51edaad32675246c30b0a6ce92806b0ed4afe91776bf3acb098579e00aca6d370be2a82f32dd7ab128c78aab79b8ba8e21ed08bc1343f0ce4cfbb99e3f876611e956d5992e351308c16b8c7b61ba191a5a55ebff04a17d974dcad", 0xd2) shmget(0x1, 0x1000, 0x54000000, &(0x7f0000fff000/0x1000)=nil) inotify_init1(0x80800) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000340)={0x2, 0xb4, 0x3, 0x80800, r1}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockname$netrom(r1, &(0x7f0000000380)={{0x3, @default}, [@bcast, @rose, @null, @null, @netrom, @remote, @netrom, @bcast]}, &(0x7f0000000400)=0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r0, 0x28, &(0x7f0000000440)}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000004c0)={{0x0, 0x0, 0xbc8, 0x3, 0x605b}, 0x20, 0x1, 'id0\x00', 'timer0\x00', 0x0, 0xfffffffffffffff3, 0x40, 0x1, 0x8000}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x4001, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000600)={0x8, 0x401, [0x40, 0x7, 0x907, 0x200, 0x8], 0x3}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000640)={r3, 0xe24, 0x1f75, 0x1}) write$cgroup_subtree(r4, &(0x7f0000000680)={[{0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'io'}, {0x2b, 'io'}, {0x2b, 'cpu'}]}, 0x2e) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000700)={0x2, 0x0, 0x0, 0x800}) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f0000000740)={0x9, r6, 0x1, 0x8000}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000840)={0xb, 0x10, 0xfa00, {&(0x7f0000000780), 0xffffffffffffffff, 0xffffffff}}, 0x18) [ 206.373120][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.394594][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.406026][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.417441][ T7264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.429167][ T7264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.454113][ T7264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.483185][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.492046][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:23:37 executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x410100, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r6 = socket(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r5, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r6}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r5, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x10000}, @L2TP_ATTR_MTU={0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x17, &(0x7f0000000080), 0x14) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000040)={{0x1, 0x0, @reserved="6e110e599ae6f7d8e9000db705c54743a80f2ab9ce41f4ef2dd56788368c0da1"}}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x48}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:23:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000042c0), 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x130) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, [], 0x1}, 0x0, 0x0, 0x1, 0x1, 0xfffb, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000680)={'syz0', "20a742602f123281a5a3fbbf78e26ad09c7784016e6001cd2ba6427d1ce92313b0fadd3b7a84b6c4086d3cedcef6785e47d3af4ff8dd01c939fbc4bb9686f685017b89fe66789375e9587a7e2227391e02f50a4541f264a51226d89f6e0ab02880be2a81e10af22ed41916d669c59eef36987dc1caa57f0d4d1128492952d31ab75d429b4df552c8c942c04a0f8173674e43127437986b1fd90a5d8869d91fe301afb7d995c18dc535a09f6e46e19a549f56f309bfaa75e66fdd916cd71f6493487c8bad199efdbc5205f50c1e4a5e7a224f2608ba8e4c44f56d734682167015f6749d5a28f19d0dfd03a5d2"}, 0xf0) sendfile(r1, r2, &(0x7f0000000340)=0xffff, 0x4000000000dc) dup2(r1, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000580)="0dd1dc149df4f0b561be9bfc152c6ab1aebca48d9f4c49a38956b48c8bd2bab5a49e75a30d7892c25e0daa919ddb0661fecaea18da11c742d98676b7a7577b82f57f09887d39c028a65d808ebee0ff9022bc3f90361b46b2faae93b869162a9b8295c1ce35866a36197339e75dc14d69e8b803b214d3ecbedc96d10b0af417fe5d58308644838be230d41a5fbd72ed3ed25ae9fcf4ecbc0ffe982dd031105e4b6e47d8ce7ca6f55b90443c9b33ef648b7f1eef658b3cdb37e39935de9d999751e8a987121ffd11a938e8", 0xca, 0xa6345a8ed04e7bc6, 0x0, 0x0) getpeername$ax25(r2, &(0x7f0000000080)={{}, [@remote, @bcast, @rose, @rose, @null, @bcast, @rose, @default]}, &(0x7f0000000180)=0x48) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="100027bd7000fedbdf250100000005000400010000001400020076657468315f746f5f687372000000000900030073797a3000000000050004000100000005000400020000000900030073797a31000000000900010073797a30000000001400020064756d6d79b426c5f43c5eada0"], 0x78}, 0x1, 0x0, 0x0, 0x4040000}, 0x40001) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{0x4, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x2, 0x1}, {0x2, 0x0, 0x0, 0x1}}, {{0x0, 0x0, 0x1}, {0x2, 0x1, 0x1}}, {{0x1, 0x1}, {0x1, 0x1, 0x1}}, {{}, {0x3, 0x1, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}], 0x40) [ 206.662716][ T7507] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 206.688290][ T7507] usb 1-1: config 0 interface 0 altsetting 0 has a duplicate endpoint with address 0x1, skipping [ 206.902312][ T7507] usb 1-1: New USB device found, idVendor=1b3d, idProduct=0153, bcdDevice=26.3c [ 206.911393][ T7507] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 206.951091][ T7507] usb 1-1: Product: syz [ 206.957904][ T7507] usb 1-1: Manufacturer: syz [ 206.963733][ T7507] usb 1-1: SerialNumber: syz [ 206.970319][ T7507] usb 1-1: config 0 descriptor?? [ 207.013869][ T7507] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 207.035277][ T7507] usb 1-1: Detected FT-X [ 207.040588][ T7507] ftdi_sio ttyUSB0: Overriding wMaxPacketSize on endpoint 1 14:23:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038080000000a0102000000000000000000000000040004"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000080)=0x1c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x100000005) [ 207.232409][ T7507] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 207.256394][ T27] audit: type=1804 audit(1596291817.881:10): pid=8228 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir422591600/syzkaller.xKBUQA/3/cgroup.controllers" dev="sda1" ino=15752 res=1 [ 207.272783][ T7507] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 207.283024][ T3855] Bluetooth: hci0: command 0x041b tx timeout [ 207.294906][ T7507] usb 1-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 207.313355][ T8228] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 207.333187][ T7507] usb 1-1: USB disconnect, device number 3 [ 207.350102][ T7507] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 207.366504][ T7507] ftdi_sio 1-1:0.0: device disconnected [ 207.903088][ T3855] Bluetooth: hci1: command 0x0409 tx timeout [ 207.948850][ T27] audit: type=1804 audit(1596291818.571:11): pid=8229 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir422591600/syzkaller.xKBUQA/3/cgroup.controllers" dev="sda1" ino=15752 res=1 [ 207.984475][ T8265] Unknown ioctl 25630 [ 207.994801][ T8265] Unknown ioctl 21541 [ 207.999836][ T8265] Unknown ioctl -1073191926 [ 208.073486][ T8265] Unknown ioctl 25630 [ 208.091487][ T8271] Unknown ioctl 21541 [ 208.106250][ T8266] Unknown ioctl -1073191926 14:23:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) socket$xdp(0x2c, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, &(0x7f0000005b40)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec00000010000108000000000000005024a692ad0000000000ee8d2586349aee344249f69087916d687583bda8071698802709baa59292dac2559cb9458b3373", @ANYRES32=r5, @ANYBLOB="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"], 0xec}}, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x4e23, @local}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x648dccb}], 0x6c) 14:23:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = getpid() dup2(0xffffffffffffffff, r1) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) mmap(&(0x7f0000c31000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket(0x0, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000240)) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8800000024000b0f000000000000002000000000", @ANYRES32=r5, @ANYBLOB="00000000ffff0000000000000b0001006d717072696f00005800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f00"/112], 0x88}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf251c0000000c00990000000000000000000c00990000000000000000000c009900230100000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900000000e428ffffff08000300", @ANYRES32=r5, @ANYBLOB="7bb81b28713eae6c53c3ec709762b6b40c70f628f103ea60b0541fe945678c9366568ef1a718b433a44513992c9ed126d507b9362659fb02bbbc8ab6693fda5173ee90506418d10cfd769c79b043435b2fec32260f97204bf50ac01f0abdd3c068f89f2b5600004c35c5aade226efa83e0061589c7c36c2b141dd522b1f71b6b5bb875471db45c27fa73616b0ca920c51ac7ae14de6a553ef6f8fcd65f890f1f2758561c3c466c042c90bc3ea48285620cb44c1fe84554b33500686c760d213d4caadbe376c00d1676a6567ec9b2f661cdca7b9fe8aa347c41ec000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40881}, 0x40000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) 14:23:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000042c0), 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x130) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, [], 0x1}, 0x0, 0x0, 0x1, 0x1, 0xfffb, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000680)={'syz0', "20a742602f123281a5a3fbbf78e26ad09c7784016e6001cd2ba6427d1ce92313b0fadd3b7a84b6c4086d3cedcef6785e47d3af4ff8dd01c939fbc4bb9686f685017b89fe66789375e9587a7e2227391e02f50a4541f264a51226d89f6e0ab02880be2a81e10af22ed41916d669c59eef36987dc1caa57f0d4d1128492952d31ab75d429b4df552c8c942c04a0f8173674e43127437986b1fd90a5d8869d91fe301afb7d995c18dc535a09f6e46e19a549f56f309bfaa75e66fdd916cd71f6493487c8bad199efdbc5205f50c1e4a5e7a224f2608ba8e4c44f56d734682167015f6749d5a28f19d0dfd03a5d2"}, 0xf0) sendfile(r1, r2, &(0x7f0000000340)=0xffff, 0x4000000000dc) dup2(r1, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000580)="0dd1dc149df4f0b561be9bfc152c6ab1aebca48d9f4c49a38956b48c8bd2bab5a49e75a30d7892c25e0daa919ddb0661fecaea18da11c742d98676b7a7577b82f57f09887d39c028a65d808ebee0ff9022bc3f90361b46b2faae93b869162a9b8295c1ce35866a36197339e75dc14d69e8b803b214d3ecbedc96d10b0af417fe5d58308644838be230d41a5fbd72ed3ed25ae9fcf4ecbc0ffe982dd031105e4b6e47d8ce7ca6f55b90443c9b33ef648b7f1eef658b3cdb37e39935de9d999751e8a987121ffd11a938e8", 0xca, 0xa6345a8ed04e7bc6, 0x0, 0x0) getpeername$ax25(r2, &(0x7f0000000080)={{}, [@remote, @bcast, @rose, @rose, @null, @bcast, @rose, @default]}, &(0x7f0000000180)=0x48) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="100027bd7000fedbdf250100000005000400010000001400020076657468315f746f5f687372000000000900030073797a3000000000050004000100000005000400020000000900030073797a31000000000900010073797a30000000001400020064756d6d79b426c5f43c5eada0"], 0x78}, 0x1, 0x0, 0x0, 0x4040000}, 0x40001) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{0x4, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x2, 0x1}, {0x2, 0x0, 0x0, 0x1}}, {{0x0, 0x0, 0x1}, {0x2, 0x1, 0x1}}, {{0x1, 0x1}, {0x1, 0x1, 0x1}}, {{}, {0x3, 0x1, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}], 0x40) 14:23:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="666c8ad2869a00"]) 14:23:38 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0x80000001}}}, &(0x7f00000021c0)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002200)={r7, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) 14:23:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0f20e035010000000f22e0b9e30b0000b8ab75cc71ba000000000f30b8010000000f01d90f20c035000000400f22c0b9800000c00f3235008000000f302e0f6b8eec8cfce40f22c0ea3b0f00009600660f65470867260f790a", 0x59}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0}, 0x24004080) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x1, 0x0, 0xfffffffffffffffe, 0xff, 0x0, 0x5, 0xc5e, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed1, 0xb4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, 0x3, 0x1, 0x580, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffbff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8}]}, @CTA_LABELS_MASK={0x2c, 0x17, [0xfffffff8, 0x5, 0xffffffff, 0x5, 0x8, 0x41, 0x800, 0x0, 0x0, 0x10000]}, @CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_ORIG={0x24, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xffff0001}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6b0}]}, @CTA_TUPLE_MASTER={0x64, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000080)=0x2) [ 208.223296][ T2573] Bluetooth: hci2: command 0x0409 tx timeout [ 208.275912][ T8278] FAT-fs (loop0): Unrecognized mount option "flŠÒ†š" or missing value [ 208.343453][ T8284] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 208.390205][ T8278] FAT-fs (loop0): Unrecognized mount option "flŠÒ†š" or missing value 14:23:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xa, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r6) ioctl$RNDGETENTCNT(r7, 0x80045200, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$UHID_DESTROY(r9, &(0x7f0000000080), 0x4) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000001640)=""/4096) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 14:23:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x17, &(0x7f0000000080)={r5}, 0x14) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000740)={r5, 0x13e, "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"}, &(0x7f0000000200)=0x146) sync() r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0xd0000) sendmsg$NL80211_CMD_GET_KEY(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x100, 0x70bd2d, 0x0, {}, [@NL80211_ATTR_KEY_SEQ={0xe, 0xa, "395508db982338a87f1e"}]}, 0x24}}, 0x20000000) sendmmsg(r0, &(0x7f0000007f80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="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", 0x2b8}], 0x2}}], 0x1, 0xffe0) 14:23:39 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0x80000001}}}, &(0x7f00000021c0)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002200)={r7, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) 14:23:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e292) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x9, @bcast, @netrom={'nr', 0x0}, 0x8, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r2, @ANYRES64], 0x4c}, 0x1, 0x1faa}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r1, 0x0, 0x10000000f) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:23:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x400c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffff7ffffffffd, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, '-'}], 0xa, "63e748370ed1e53355fa"}, 0x17) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x4, 0x80, 0x400}, 0x40) 14:23:39 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0x80000001}}}, &(0x7f00000021c0)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002200)={r7, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) 14:23:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) [ 209.022871][ T3855] Bluetooth: hci3: command 0x0409 tx timeout 14:23:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PAUSE_SET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r7, 0x247544e0c8925827, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000001500)={0x3cc, r7, 0x800, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_OURS={0x178, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x144, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, 'cgroup.controllers\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ']*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '.#{,[.@\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x0, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\!,.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x47084af1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*\\}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x744}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x2f, 0x5, "9c43a7c78f8af50db97b0a55677cb4d681f0d6fef0d7f6eb9d4f02235f1c42e6aed930e4c7cecb07b800e2"}]}, @ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x0, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x1cc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40}, @ETHTOOL_A_BITSET_BITS={0x1b8, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '#)+\xe1\'#[}\x87\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, 'cgroup.controllers\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '}-]]({}.-}\'$#,\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x151}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, 'cgroup.controllers\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xc0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\]]/^^,@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x25f3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x67c4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4ac}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '($\xb2]/]/\\!],\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']:-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '%#%{#+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, 'cgroup.controllers\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x3}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x8b}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x8800}, 0x20000841) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="040000004ef2bcd1a7c6a9a03cbd574319610a5b9e494029fa9ffef63cc03d1d843b78169ec39f02c1cf0c5113bf0053cb4829eda58582", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[], 0x4}}, 0x0) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000400)=""/219, 0xdb}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2, 0x5, 0x401) sendfile(r3, r2, 0x0, 0x100000002) 14:23:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000000)="16ba7ce6781df050b41df146e1d568a3d2436d405f663c7717a15ca3f8048a302dde2d266f8bb684eedef229fc4e10ca9de0290873794be9253a89f42a41e5a3378dba78d146c5ccde59f42b71dbe7faaf16a4a4ce4355b5d1f5d7ffefe23f0e74a5eb187fcb0324f2aac88b6bfe3d5740394ae0c8b0b7b0400e0e72d13277606b381848e980b9", 0x87, 0x7}, {&(0x7f00000000c0)="cdea22334bc2dfdf81d22a48117fd2963e81c8972c441011571f", 0x1a, 0x7fff}, {&(0x7f0000000100)="a12dad8e597da84d7ee4465ecd56badd70d961b93bf37278704a3efebb88ec96b3e7cc71f28a0ad1b22383c45b9ae708c43b23a911d8911362eb6a9d08292c3404be2fc4c15f580fc822c06b8458593d4f6a4e865ad7148cfa80bdf28f84657f3bc4c2c02d598dd90aa36a53a2bc461d654aca34bd038d09d4debb2a2f013a2f589a48b073ce20bc702878201e63e946d7ba779f61ee0ffd89fec4926db9852fca6d5da0424a6a605ca6190edc0d2a79167c4382a058", 0xb6, 0x1}, {&(0x7f00000001c0)="462cd28cef2a61a6e78ba4e0183cd98218536dda1885600cee7dbf9487dd3271ae", 0x21, 0x6}]) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0xf7, @none, 0x2}, 0xe) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000280)={0x1, 0x6, 0xffffffff, 0x2, 0x101, 0x0, 0x80000000}) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) bind(r3, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @remote}, 0x1, 0x1, 0x2, 0x1}}, 0x80) [ 209.053222][ T27] audit: type=1804 audit(1596291819.681:12): pid=8317 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir979781796/syzkaller.8bC3Ta/2/cgroup.controllers" dev="sda1" ino=15751 res=1 14:23:39 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0x80000001}}}, &(0x7f00000021c0)=0x84) [ 209.164992][ T8317] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 209.264811][ T7507] Bluetooth: hci4: command 0x0409 tx timeout [ 209.275730][ T27] audit: type=1804 audit(1596291819.901:13): pid=8328 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir132224526/syzkaller.bwDqPc/5/cgroup.controllers" dev="sda1" ino=15763 res=1 14:23:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) [ 209.344186][ T3855] Bluetooth: hci0: command 0x040f tx timeout [ 209.719564][ T8328] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 209.743381][ T27] audit: type=1804 audit(1596291820.361:14): pid=8325 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir979781796/syzkaller.8bC3Ta/2/cgroup.controllers" dev="sda1" ino=15751 res=1 [ 209.801759][ T8328] File: /root/syzkaller-testdir132224526/syzkaller.bwDqPc/5/cgroup.controllers PID: 8328 Comm: syz-executor.1 [ 209.871533][ T3855] Bluetooth: hci5: command 0x0409 tx timeout [ 209.993235][ T3855] Bluetooth: hci1: command 0x041b tx timeout [ 210.309359][ T3861] Bluetooth: hci2: command 0x041b tx timeout 14:23:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0f20e035010000000f22e0b9e30b0000b8ab75cc71ba000000000f30b8010000000f01d90f20c035000000400f22c0b9800000c00f3235008000000f302e0f6b8eec8cfce40f22c0ea3b0f00009600660f65470867260f790a", 0x59}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0}, 0x24004080) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x1, 0x0, 0xfffffffffffffffe, 0xff, 0x0, 0x5, 0xc5e, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed1, 0xb4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, 0x3, 0x1, 0x580, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffbff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8}]}, @CTA_LABELS_MASK={0x2c, 0x17, [0xfffffff8, 0x5, 0xffffffff, 0x5, 0x8, 0x41, 0x800, 0x0, 0x0, 0x10000]}, @CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_SEQ_ADJ_ORIG={0x24, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xffff0001}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6b0}]}, @CTA_TUPLE_MASTER={0x64, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000080)=0x2) 14:23:41 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) recvfrom$inet6(r6, &(0x7f0000002000)=""/167, 0xa7, 0x23, &(0x7f00000020c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x40}, 0x1c) 14:23:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) 14:23:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) 14:23:41 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x265) 14:23:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)={0x1, [0x0]}, 0x0) read$hiddev(r0, &(0x7f0000000340)=""/242, 0xf2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) r1 = gettid() tkill(r1, 0x31) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x5c, r3, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x5c}}, 0x0) dup(0xffffffffffffffff) 14:23:41 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/capi/capi20ncci\x00', 0x2d0400, 0x0) 14:23:41 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x265) 14:23:41 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x402041, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x3, 0x7fffffff, 0x6, 0x4, 0xd, "6385ac1cedb604de2ad0cd88262cf4b6657223"}) 14:23:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) 14:23:41 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x265) [ 211.102468][ T2515] Bluetooth: hci3: command 0x041b tx timeout 14:23:41 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) openat$dir(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x2040, 0x5) [ 211.352468][ T2515] Bluetooth: hci4: command 0x041b tx timeout [ 211.432509][ T3855] Bluetooth: hci0: command 0x0419 tx timeout [ 211.942791][ T3855] Bluetooth: hci5: command 0x041b tx timeout [ 212.062435][ T3855] Bluetooth: hci1: command 0x040f tx timeout 14:23:43 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0}, 0x30020, 0x0, 0x7, 0x0, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socket$inet_udp(0x2, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='c', 0xfffff, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pwritev(r2, &(0x7f0000001200)=[{&(0x7f0000000000)="dd", 0x1}], 0x1, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:23:43 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x265) 14:23:43 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x402041, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x3, 0x7fffffff, 0x6, 0x4, 0xd, "6385ac1cedb604de2ad0cd88262cf4b6657223"}) 14:23:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) write$UHID_CREATE2(r1, &(0x7f0000001a40)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0xe6, 0x8, 0xf2ce, 0x1, 0x3, 0x7ff, "6fd7797153e13c489a842555b53e2bd3a6c01ee531e91733dc76caa3cec8b2400b0fc333f236e12fbfd97d139d634fbc2b54a1812ef0c15b110050a25c060361ede988e771742a17ff4966477bee38224e4aad40fcdd03e34b94c2bdab9f03a4461159a499f32252b4a7cd668f1bd3fda3d85890172b0840a03ca3cacf911c5fd1a1dd2aed826d30d6b294a4935568975eff83fe9ee55208161da00619d2515797a59b338151aa26b5acf28d2b8ecd6ac183ec63f83647ebe1ba976714683cb1e187f88ef0a1250b9693f49af52b498fc149b4df89b57814ee8e83c5bb61e50dfd9daff4ca34"}}, 0x1fe) 14:23:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:43 executing program 1: r0 = io_uring_setup(0x171e, &(0x7f0000000040)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa, 0x12, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000180), 0x0, 0x4) r2 = syz_io_uring_complete(r1) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x4) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x8}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r3, 0x0, 0x0) syz_usb_control_io$hid(r3, &(0x7f00000007c0)={0x24, 0x0, 0x0, &(0x7f0000000740)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "ec370275"}]}}, 0x0}, 0x0) syz_usb_ep_write(r3, 0x0, 0x0, 0x0) [ 212.382650][ T3855] Bluetooth: hci2: command 0x040f tx timeout 14:23:43 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x265) 14:23:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) socket$l2tp6(0xa, 0x2, 0x73) 14:23:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:43 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x265) [ 212.802501][ T2573] usb 2-1: new high-speed USB device number 2 using dummy_hcd 14:23:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f0000001a00)=0x4000000) 14:23:43 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x265) [ 213.184038][ T3855] Bluetooth: hci3: command 0x040f tx timeout [ 213.185146][ T2573] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 14:23:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 213.239552][ T2573] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 213.283620][ T2573] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 14:23:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x400, 0x0) 14:23:43 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x265) [ 213.382519][ T2573] usb 2-1: config 0 descriptor?? [ 213.432314][ T3861] Bluetooth: hci4: command 0x040f tx timeout [ 213.875307][ T2573] keytouch 0003:0926:3333.0001: fixing up Keytouch IEC report descriptor [ 213.982352][ T3855] Bluetooth: hci5: command 0x040f tx timeout [ 214.074618][ T2573] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.0001/input/input5 [ 214.154226][ T3861] Bluetooth: hci1: command 0x0419 tx timeout [ 214.186706][ T2573] keytouch 0003:0926:3333.0001: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 214.278076][ T2573] usb 2-1: USB disconnect, device number 2 [ 214.465999][ T3861] Bluetooth: hci2: command 0x0419 tx timeout 14:23:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR2(r6, 0xc02464bb, &(0x7f0000000040)={0x2, 0x0, 0x6, 0x7, 0x9, 0x5, 0x100000, 0x80}) r7 = fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x28700, 0x0) fdatasync(r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0xa) ioctl$SG_NEXT_CMD_LEN(r7, 0x2283, &(0x7f0000000000)=0x8f8) write$cgroup_int(r2, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) connect$packet(r3, &(0x7f0000000280)={0x11, 0x18, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 14:23:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:45 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x265) 14:23:45 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) accept4$unix(r0, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e, 0x800) 14:23:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x6, {0x0, 0x4, 0x7, 0x3}}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(0xffffffffffffffff, 0x200002) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x2020, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f00000000c0)=[{0x1, 0x2, 0x21, 0x8001}, {0x400, 0x2, 0x6}, {0x6, 0x6, 0x0, 0x80000001}]}, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x80001d00c0d0) 14:23:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:45 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x265) 14:23:45 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000018c0)={r4}) 14:23:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x6, {0x0, 0x4, 0x7, 0x3}}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(0xffffffffffffffff, 0x200002) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x0, 0x2020, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f00000000c0)=[{0x1, 0x2, 0x21, 0x8001}, {0x400, 0x2, 0x6}, {0x6, 0x6, 0x0, 0x80000001}]}, 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x80001d00c0d0) 14:23:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000240)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @multicast1}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x3, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "ac144814f9207ce347dd11a0e8267983"}, @md5sig={0x13, 0x12, "9d1713e98debc89589102743a0cc1a8c"}, @fastopen={0x22, 0x7, "24bdea971d"}, @md5sig={0x13, 0x12, "db1484bc63dc421510bc4bd556887b58"}]}}}}}}}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x13, 0xe, 0x81}) 14:23:45 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x265) 14:23:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="7281d4e4827b2c23e1d53dd775389bb2f27043e7f78ed5783a4805a1aa3457208c37b2a9a82700"/54], 0x3c, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:45 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001880)={0x7, 0x7, 0x6, 0xffff4395}) [ 215.262580][ T3855] Bluetooth: hci3: command 0x0419 tx timeout 14:23:46 executing program 1: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="050000000000050400"], 0x9, 0x0) 14:23:46 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) [ 215.503390][ T2515] Bluetooth: hci4: command 0x0419 tx timeout 14:23:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:46 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@broadcast, @dev={0xac, 0x14, 0x14, 0x16}, @rand_addr=0x64010100}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a000000010003b0e2000"/20, @ANYRES32, @ANYBLOB="020000000000000080001200080001007674693674000200600005000000000008000200000000000800000000000000080006000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800020000000800fdff03000000000008477216447f6d502a0004007f000001080005000000000008000400000000000800060000000000080006"], 0xa0}}, 0x0) r1 = socket(0x6, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x4000000000001f2, 0x0) 14:23:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ptrace$pokeuser(0x6, r3, 0x1, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r4, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0500000088fb00000000a809ffff8000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000800100000000000000000000009373a07edb73955521d841f2be869631ea9506dd3d50254cfa5b2b020000b62dce8100"/80], 0x80}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) ptrace$cont(0x20, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x9, 0x80, 0x2, 0x20, 0x0, 0xcc0, 0x102, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x8408, 0xff, 0xff, 0x1, 0x7fc00000000000, 0x20400000, 0x5e1b}, 0x0, 0xd, 0xffffffffffffffff, 0x8) 14:23:46 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_EDID(r5, 0xc0285629, &(0x7f0000000040)={0x0, 0x7fffffff, 0x8, [], &(0x7f0000000000)=0x8}) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r6, 0x400, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000801) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x800, 0x0) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f00000018c0)=""/246) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000200)={0x8, 0x40}) ioctl$PPPIOCSFLAGS1(r7, 0x40047451, &(0x7f00000003c0)) 14:23:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r6, 0x10e, 0x3, &(0x7f0000000080)=0x4, 0x4) r7 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x1400200) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r7, 0xc0145401, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x401, 0x3, 0x5}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10) r9 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r9, 0xfffffffffffffffe, 0x0, 0x0) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7f, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default]}) keyctl$reject(0x13, 0x0, 0x8, 0x1, r9) 14:23:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:46 executing program 1: syz_genetlink_get_family_id$nl80211(0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$read(0xb, r3, &(0x7f0000000080)=""/32, 0x20) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b725}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x48}}, 0x0) 14:23:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:46 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0xc0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) [ 216.062515][ T2515] Bluetooth: hci5: command 0x0419 tx timeout [ 216.216904][ T8590] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 14:23:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x46560, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffe56, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x4004080) close(r1) 14:23:46 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r2, &(0x7f0000001400)=""/58, 0x3a) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x68002100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) exit(0x0) [ 216.301179][ T8590] device gretap0 entered promiscuous mode [ 216.338049][ T8590] device macvlan2 entered promiscuous mode [ 216.370079][ T8590] device gretap0 left promiscuous mode [ 216.435590][ T8609] IPVS: ftp: loaded support on port[0] = 21 14:23:47 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:47 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)}, {&(0x7f0000001140)=""/151, 0x97}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/168, 0xa8}], 0x6, 0x6, 0xffffffe1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:47 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x400) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:47 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x4100, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 216.997186][ T8631] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 217.004779][ T8631] device gretap0 entered promiscuous mode [ 217.004832][ T8631] device macvlan2 entered promiscuous mode [ 217.007842][ T8631] device gretap0 left promiscuous mode [ 217.215438][ T8610] IPVS: ftp: loaded support on port[0] = 21 14:23:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:48 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x46560, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffe56, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x4004080) close(r1) 14:23:48 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) [ 217.974810][ T161] tipc: TX() has been purged, node left! 14:23:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x68002100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) exit(0x0) 14:23:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:50 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:51 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 220.538237][ T8739] IPVS: ftp: loaded support on port[0] = 21 14:23:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:51 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd2c6, 0x0, 0xfffffffffffffe98) 14:23:51 executing program 1: ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 14:23:51 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r6, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 221.012399][ T37] tipc: TX() has been purged, node left! 14:23:52 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000000000008d80402f04000000000010902240001000000000904000001030100000921000000012201000905810308"], 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\"s'], 0x0}, 0x0) r3 = syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000002c0)=ANY=[@ANYBLOB="12010000020000402505a1a440000102030109023b0001010000000904000002020600c4"], 0x0) syz_usb_control_io$cdc_ecm(r3, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r3, 0x0, 0x1, &(0x7f0000001800)="ba") 14:23:52 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000500)='./bus/../file0\x00', 0x90) r1 = socket(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x6, 0x39) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000380)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000400), &(0x7f0000000440)=0x40) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pwritev2(r5, &(0x7f0000000000)=[{&(0x7f00000005c0)="f2fb9b3de62bdff2f0eb2aec12eca4603e23c81b62618a95142239faba323ac8227d35af16c3804c0547eb39b2d2213a4c0d047344b17cf4f3bb3cc36449e7f13a0441549b05ba16f3827b3ab5839871e24c0909e36f1dddbb3a1f8cf7355773c732c7343148aec868a4cbe396844704d39b8358add10b2649f55b459368a4e2a97cedcf2185ba96983c9489437f7e8dcb22755aa6e004aa8163dd1233c528bf9515dfb1f061f383", 0xa8}, {&(0x7f0000000680)="ca2620d6437d391874fc59fc0ce0374a09c08421a591af2d0f07bc1e90ea4768fb8898b8519c0474333693c545a087d2a8542808c6b26e20d5553c001807d5ddbe3c15c85412002dbe7c369b1404811909fb76c46315837fe1d2586d78dc565e488c9f90636a14985d97746d2cdd6eab13e3a30cfab6b1fa3b2f1386292f107e4623dea15e73ebaae482c1c05c60cc6459daa625a1b04203c35879dc0f82601a8904bea1b6", 0xa5}, {&(0x7f0000000100)="522aac1d012c890272e6812d4881b307000000000000005c", 0x18}, {&(0x7f0000000280)="251c10ad3a05725f55191af193150ba5f58e05fa727938261194b61ad0a423259c710b77b0be522412b0d624be89b37c455a36e7476a35f3db2cc253bd5826a79659e7b17026bce56829464b1064c614edf583b978478e6bc4be936e7305730d73d1f0c09daddadaf31772d4f0c4a8def9720925da4cb4532df729c9a139856c1d36aea8386ee5c2b2de848256cf08405a672a62f310e4c647e4f3f71d7fedde9fb0df48675d17539848670079689270213d23d9b8f56f350d6817ed3d4b323fc5eb8bbc63b20544fb664a18be36c35cfb43460a218085ca45ec0ee30e630cc5ec11b73d0dd6e52dacd66693b218b2057e0a9fef328609d5192d631dce628d", 0xff}], 0x4, 0x101, 0x1, 0x5) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2000007, 0x12, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x20, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40004, 0x8, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x0, r0, 0x3) io_submit(r6, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$PPPIOCDISCONN(r0, 0x7439) rt_tgsigqueueinfo(0x0, 0x0, 0x1d, &(0x7f0000000480)={0x40, 0x1, 0xbd0f}) [ 221.677577][ T8785] loop1: p1 < > p2 p3 < p5 p6 > p4 14:23:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x2008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000046c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2400c845) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x1) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) 14:23:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:23:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, 0xffffffffffffffff, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'veth0_vlan\x00', {0x2, 0x4e23, @remote}}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x240, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNAPSHOT_CREATE_IMAGE(r7, 0x40043311, &(0x7f00000000c0)) [ 221.769351][ T8785] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 221.872384][ T8785] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 221.925137][ T27] audit: type=1804 audit(1596291832.551:15): pid=8813 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir422591600/syzkaller.xKBUQA/16/file0" dev="sda1" ino=15862 res=1 14:23:52 executing program 1: ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 14:23:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, 0xffffffffffffffff, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 221.942191][ T3855] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 222.183873][ T3855] usb 1-1: Using ep0 maxpacket: 8 [ 222.215418][ T8827] ptrace attach of "/root/syz-executor.2"[7050] was attempted by ""[8827] [ 222.302408][ T3855] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 222.302439][ T3855] usb 1-1: New USB device found, idVendor=04d8, idProduct=f002, bcdDevice= 0.40 [ 222.302455][ T3855] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 222.304197][ T3855] usb 1-1: config 0 descriptor?? [ 222.578367][ T8831] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 222.589828][ T8831] loop1: p2 size 1073741824 extends beyond EOD, truncated 14:23:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, 0xffffffffffffffff, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:23:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x406, r4) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socket(0x10, 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x4, 0x50) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x0, 0x0) [ 222.709923][ T8831] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 222.784829][ T3855] hid-picolcd 0003:04D8:F002.0002: unknown main item tag 0x0 [ 222.852323][ T3855] hid-picolcd 0003:04D8:F002.0002: No report with id 0xf4 found [ 222.852344][ T3855] hid-picolcd 0003:04D8:F002.0002: No report with id 0xf3 found [ 222.989718][ T8802] udc-core: couldn't find an available UDC or it's busy [ 222.989785][ T8802] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 223.000343][ T8158] usb 1-1: USB disconnect, device number 4 [ 223.782187][ T8158] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 223.857778][ T8895] udc-core: couldn't find an available UDC or it's busy [ 223.880996][ T8895] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 14:23:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000000000008d80402f04000000000010902240001000000000904000001030100000921000000012201000905810308"], 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\"s'], 0x0}, 0x0) r3 = syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000002c0)=ANY=[@ANYBLOB="12010000020000402505a1a440000102030109023b0001010000000904000002020600c4"], 0x0) syz_usb_control_io$cdc_ecm(r3, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r3, 0x0, 0x1, &(0x7f0000001800)="ba") 14:23:54 executing program 2: clone(0xa23ba7d9706b19f4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, @perf_config_ext={0x2, 0x8}, 0x0, 0x400000, 0x5, 0x2, 0x5, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0xa) syz_emit_ethernet(0x21, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)={0x0, 0x3, [0x67e, 0x511, 0xbb8, 0xbf5]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20a000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip_mr_vif\x00') preadv(r1, &(0x7f00000017c0), 0x0, 0x5dde, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x84000) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x400, 0x80009, 0x9, 0x4}) ptrace$setopts(0x4206, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/time\x00') ioctl$BLKTRACESTART(r2, 0x1274, 0x0) dup(0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000380)="889666667713d681651d68fbf09a784a5a3982625f3636579aae0b01a1d67947925d1a3a001fd693ff41ea5468a626fc04d28101b0353c2dcfad61bd06e9e72a2463c09aa0aaaa55b22890cc8604b2446589a2aa0fd844b23dfe64b084b052a9ed0d84892ee36b5cf50ed00fcea4881bae10671c494ab40ea7f9a4dbb6", 0x7d}, {&(0x7f0000000400)="c9499475595daeb03dc99ce059efdbdf3011d234c5cdfd2d6dbd6ac69ef44c362770e797c7e787283c68b6b8fd73bf4d1305d56db438f07146ca33ec73713d8b36c5", 0x42}, {&(0x7f0000000480)="143ddb1bf92bb5eeabd35d1ea0d1b6b5573daeecc942ab8878e0e182bb9611d5b297c7f6abfb9f2ed54e48949b88da76d18877945bf851f0956f6f0d209c82fc7f9ce7ede89f9cf1390ed73d88f5399ca7b21c66cd63a0a5cfcb51350f23a5a9e42341c00ec10fa3ce9218eb3290a146831b124a4718d77b76df38dbe7cdfebf1626f1b824da6d5e17b2ea6498f1c3126093cbab0be36e47c38df1476246e5d9a1e63c4ffeec", 0xa6}], 0x3, 0xfff, 0xed) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 14:23:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:54 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:23:54 executing program 1: ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 14:23:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 224.249818][ T8907] loop1: p1 < > p2 p3 < p5 p6 > p4 14:23:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x2, 0x9b, &(0x7f0000001440)}) [ 224.276109][ T8907] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 224.338606][ T8907] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 224.464685][ T8158] usb 1-1: device not accepting address 5, error -71 14:23:55 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x2, 0x9b, &(0x7f0000001440)}) 14:23:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) [ 224.832313][ T8158] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 225.074659][ T8158] usb 1-1: Using ep0 maxpacket: 8 [ 225.192396][ T8158] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 225.192431][ T8158] usb 1-1: New USB device found, idVendor=04d8, idProduct=f002, bcdDevice= 0.40 [ 225.192455][ T8158] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 225.194465][ T8158] usb 1-1: config 0 descriptor?? [ 225.733884][ T8158] hid-picolcd 0003:04D8:F002.0003: unknown main item tag 0x0 [ 225.802274][ T8158] hid-picolcd 0003:04D8:F002.0003: No report with id 0xf4 found [ 225.809944][ T8158] hid-picolcd 0003:04D8:F002.0003: No report with id 0xf3 found [ 225.952426][ T8912] udc-core: couldn't find an available UDC or it's busy [ 225.959416][ T8912] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 226.015406][ T3855] usb 1-1: USB disconnect, device number 6 14:23:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x2, 0x8) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000000180)) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 14:23:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x9b, &(0x7f0000001440)}) 14:23:57 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:57 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, &(0x7f0000001440)}) 14:23:57 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:57 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:58 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb6a2, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x967e}, 0xffffffffffffffff, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='/dev/vhost-net\x00', 0x0, 0x0, 0x0) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, &(0x7f00000001c0)) r0 = socket(0x29, 0x803, 0x143) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='ip_vti08\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00000000000000000000000045000014000000000000907800000000ac1414aac80f46a1d5cdc779f885b812b189ecef4974ad1fab18612cbd63a7851ff09b953b9ce7dbfbce4f406025b4a8ed72e6c1c6730c081b9cd4358101302606a990bcdc43f956cdaa084ba7729de4d0cfb54224b72da419188c"]}) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10010, r3, 0x78d4000) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') 14:23:58 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:23:58 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:23:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:23:58 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:23:59 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:23:59 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:23:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:23:59 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:23:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:23:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x2, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x10, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:23:59 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:23:59 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:23:59 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:23:59 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) socket$kcm(0x2b, 0x1, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:23:59 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:00 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b2f, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:00 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:00 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b30, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:00 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:00 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b31, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:00 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:00 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b32, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:00 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:00 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:00 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:01 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:01 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:01 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b33, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:01 executing program 2: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:01 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:01 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b34, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b35, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:01 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:01 executing program 2: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b36, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:02 executing program 2: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:02 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b37, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:02 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3a, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:02 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:02 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:03 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:03 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:03 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:03 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:04 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b40, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:04 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:04 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:04 executing program 2: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:04 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b41, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b44, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:04 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:05 executing program 2: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:05 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b45, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:05 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:05 executing program 2: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:05 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b46, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:05 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:05 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:05 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b47, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:05 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:06 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b48, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:06 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:06 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b49, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:06 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:06 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4a, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:06 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:06 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x265) 14:24:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:06 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:06 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:06 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:07 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:07 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:07 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:07 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:07 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:07 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:07 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:07 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:07 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:07 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:07 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) 14:24:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b52, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:07 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x265) 14:24:08 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b60, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:08 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) 14:24:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:08 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:08 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b61, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:08 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:08 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) 14:24:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:08 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:08 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x265) 14:24:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b62, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:08 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:08 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b63, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:09 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:09 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b64, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:09 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/wireless\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) 14:24:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b65, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:09 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b66, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:09 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b67, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:09 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:10 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:10 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b68, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:10 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:10 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b69, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:10 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:10 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:10 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:11 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6a, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:11 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:11 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:11 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:11 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:11 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:11 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:12 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:12 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, 0x0, 0x40) 14:24:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:12 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b70, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:12 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:12 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b71, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfa, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) setitimer(0x2, &(0x7f0000000140)={{0x77359400}, {r3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:13 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfb, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:13 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:13 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:24:13 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:13 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c01, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:13 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x40) 14:24:13 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:14 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:14 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5409, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:14 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:14 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:14 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:14 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:14 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:14 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x21, 0x0, 0x0) 14:24:14 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)}, 0x40) 14:24:14 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 243.847063][ T9757] FAULT_INJECTION: forcing a failure. [ 243.847063][ T9757] name failslab, interval 1, probability 0, space 0, times 1 [ 243.860058][ T9757] CPU: 1 PID: 9757 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 243.868654][ T9757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.878713][ T9757] Call Trace: [ 243.882015][ T9757] dump_stack+0x18f/0x20d [ 243.886361][ T9757] should_fail.cold+0x5/0x14 [ 243.890980][ T9757] ? rwlock_bug.part.0+0x90/0x90 14:24:14 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) [ 243.895933][ T9757] should_failslab+0x5/0xf [ 243.900360][ T9757] kmem_cache_alloc+0x40/0x3b0 [ 243.905202][ T9757] sctp_get_port_local+0x3ec/0x1410 [ 243.910428][ T9757] ? get_order+0x20/0x20 [ 243.914786][ T9757] ? __ipv6_addr_type+0x20d/0x330 [ 243.919869][ T9757] ? sctp_bind_addr_match+0x1d5/0x2c0 [ 243.925264][ T9757] sctp_do_bind+0x208/0x5c0 [ 243.929779][ T9757] ? memset+0x20/0x40 [ 243.933784][ T9757] sctp_connect_new_asoc+0x5a4/0x770 [ 243.939085][ T9757] ? sctp_bind+0xd0/0xd0 [ 243.943352][ T9757] ? security_sctp_bind_connect+0x8f/0xc0 [ 243.949152][ T9757] sctp_sendmsg+0x1377/0x1cf0 [ 243.953859][ T9757] ? sctp_setsockopt+0x70d0/0x70d0 [ 243.959007][ T9757] ? sock_has_perm+0x1ee/0x280 [ 243.963791][ T9757] ? tomoyo_socket_sendmsg_permission+0x12a/0x389 [ 243.970334][ T9757] inet_sendmsg+0x99/0xe0 [ 243.974701][ T9757] ? inet_send_prepare+0x4d0/0x4d0 [ 243.979897][ T9757] sock_sendmsg+0xcf/0x120 [ 243.984332][ T9757] ____sys_sendmsg+0x6e8/0x810 [ 243.989111][ T9757] ? kernel_sendmsg+0x50/0x50 [ 243.993858][ T9757] ? do_recvmmsg+0x6d0/0x6d0 [ 243.998465][ T9757] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 244.004452][ T9757] ? _parse_integer+0x132/0x180 [ 244.009319][ T9757] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 244.015327][ T9757] ___sys_sendmsg+0xf3/0x170 [ 244.019924][ T9757] ? sendmsg_copy_msghdr+0x160/0x160 [ 244.025213][ T9757] ? __fget_files+0x272/0x400 [ 244.029910][ T9757] ? lock_downgrade+0x820/0x820 [ 244.034765][ T9757] ? find_held_lock+0x2d/0x110 [ 244.039535][ T9757] ? ksys_write+0x212/0x250 [ 244.044063][ T9757] ? __fget_light+0xea/0x280 [ 244.048664][ T9757] __sys_sendmsg+0xe5/0x1b0 [ 244.053175][ T9757] ? __sys_sendmsg_sock+0xb0/0xb0 [ 244.058311][ T9757] ? do_syscall_64+0x1c/0xe0 [ 244.062917][ T9757] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 244.068910][ T9757] do_syscall_64+0x60/0xe0 [ 244.073394][ T9757] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 244.079332][ T9757] RIP: 0033:0x45cc79 [ 244.083233][ T9757] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.102841][ T9757] RSP: 002b:00007f0c72316c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 244.111255][ T9757] RAX: ffffffffffffffda RBX: 0000000000026dc0 RCX: 000000000045cc79 [ 244.119232][ T9757] RDX: 0000000000000040 RSI: 00000000200003c0 RDI: 0000000000000003 [ 244.127204][ T9757] RBP: 00007f0c72316ca0 R08: 0000000000000000 R09: 0000000000000000 [ 244.135180][ T9757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 14:24:14 executing program 4: mkdir(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 244.143182][ T9757] R13: 00007ffe2d6b999f R14: 00007f0c723179c0 R15: 000000000078bf0c 14:24:14 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2, 0x0, 0x0) 14:24:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:14 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) 14:24:15 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:15 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3, 0x0, 0x0) 14:24:15 executing program 4: mkdir(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:15 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:15 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:15 executing program 4: mkdir(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, 0x0) 14:24:15 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{0x0}], 0x1}, 0x40) 14:24:15 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, 0x0) 14:24:15 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:15 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x2, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:15 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:15 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:15 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, 0x0, 0x0) 14:24:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540f, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, 0x0) 14:24:15 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x3, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:15 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:15 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)}], 0x1}, 0x40) 14:24:15 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, 0x0, 0x0) 14:24:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:15 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5410, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:15 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x4, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:16 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:16 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0xb, 0x0, 0x0) 14:24:16 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:16 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5412, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:16 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x5, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:16 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x10, 0x0, 0x0) 14:24:16 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5413, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:16 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:16 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x6, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:16 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:16 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5414, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:16 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:17 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x7, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:17 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x12, 0x0, 0x0) 14:24:17 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:17 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5415, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:17 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:17 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:17 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5416, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:17 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x8, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:17 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 14:24:17 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x0) 14:24:17 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5418, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:17 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x9, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:17 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:17 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:17 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, 0x0, 0x0) 14:24:17 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:17 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x0) 14:24:17 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xb, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:17 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:18 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:18 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x10, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:18 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:18 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:18 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:18 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x17, 0x0, 0x0) 14:24:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:18 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0x14, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:18 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:18 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:18 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, 0x0, 0x0) 14:24:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:18 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:18 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:19 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, 0x0, 0x0) 14:24:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:19 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:19 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x2, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:19 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r2) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r5, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:19 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:19 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1a, 0x0, 0x0) 14:24:19 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x3, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:19 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:19 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5421, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:19 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) 14:24:19 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, 0x0, 0x0) 14:24:19 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:19 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:19 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x4, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5422, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:19 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1c, 0x0, 0x0) 14:24:19 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:19 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:19 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1d, 0x0, 0x0) 14:24:19 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5423, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:19 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:19 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x6, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:19 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:20 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:20 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5424, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:20 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1e, 0x0, 0x0) 14:24:20 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 14:24:20 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xa, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:20 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5425, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:20 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) 14:24:20 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:20 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:20 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xf, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:20 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) 14:24:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5427, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:20 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5412, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:20 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:20 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:20 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x10, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:20 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2a, 0x0, 0x0) 14:24:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5428, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:20 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:20 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x11, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:20 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, 0x0, 0x0) 14:24:20 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:20 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2b, 0x0, 0x0) 14:24:20 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5429, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:21 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:21 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xfc, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:21 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2c, 0x0, 0x0) 14:24:21 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5437, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:21 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:21 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x12c, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:21 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2d, 0x0, 0x0) 14:24:21 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) r0 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, r0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r1) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r4, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:21 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:21 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) 14:24:21 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2e, 0x0, 0x0) 14:24:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5441, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x300, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:21 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:21 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r0 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000014c0)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '+--\x9b@', 0x20, 0xfff, 0x20, [0x65]}, 0x33, r0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r3, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5437, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5450, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x2f, 0x0, 0x0) 14:24:21 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x5dc, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:21 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:21 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x10, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:21 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r0 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r3, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:21 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5451, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:21 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, 0x0, 0x0) 14:24:22 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:22 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x600, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:22 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:22 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x31, 0x0, 0x0) 14:24:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5452, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:22 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:22 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, 0x0, 0x0) 14:24:22 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xa00, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:22 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x545d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:22 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:22 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x33, 0x0, 0x0) 14:24:22 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:22 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5460, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:22 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xf00, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:22 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:22 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:22 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x5, 0x0, 0x0) 14:24:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5600, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:22 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x1100, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:22 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:22 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:22 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, 0x0, 0x0) [ 252.239267][T10238] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 14:24:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5601, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:22 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:22 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x2000, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:23 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:23 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:23 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x37, 0x0, 0x0) 14:24:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5602, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:23 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:23 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:23 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x2c01, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:23 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x38, 0x0, 0x0) 14:24:23 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:23 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x5, 0x0, 0x0) 14:24:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5603, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:23 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:23 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x39, 0x0, 0x0) 14:24:23 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x4000, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:23 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5605, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:23 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:23 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3a, 0x0, 0x0) 14:24:23 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4, 0x0, 0x0) 14:24:23 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x80fe, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:23 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:23 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5606, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:23 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:23 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, 0x0, 0x0) 14:24:24 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xc0fe, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:24 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5607, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:24 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:24 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:24 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:24 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xdc05, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5608, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:24 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:24 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3e, 0x0, 0x0) 14:24:24 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:24 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:24 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xfc00, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5609, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:24 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) 14:24:24 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x42, 0x0, 0x0) 14:24:24 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:24 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:24 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:24 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xfe80, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:24 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x43, 0x0, 0x0) 14:24:24 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560a, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:24 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:24 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xfec0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:24 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:24 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) 14:24:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:24 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:25 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:25 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0xff00, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:25 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560c, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:25 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:25 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 14:24:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:25 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:25 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:25 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:25 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:25 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:25 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4a, 0x0, 0x0) 14:24:25 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:25 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:25 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:25 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4b, 0x0, 0x0) 14:24:25 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4c, 0x0, 0x0) 14:24:26 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x35, 0x0, 0x0) 14:24:26 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560f, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:26 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:26 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4d, 0x0, 0x0) 14:24:26 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:26 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:26 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:26 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) 14:24:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x6364, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:26 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x3) 14:24:26 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:26 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:27 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x300) 14:24:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x8933, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:27 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:27 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:27 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:27 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x3000000) 14:24:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400448c9, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:27 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:27 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:27 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 14:24:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400448dd, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:27 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xa, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:27 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x300000000000000) 14:24:27 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r1, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:27 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:28 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:28 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200000, 0x0) ioctl$HIDIOCGDEVINFO(r1, 0x801c4803, &(0x7f0000000040)=""/63) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400454ca, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:28 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:28 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:28 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:28 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:28 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:28 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x40049409, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:28 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:28 executing program 2: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:28 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xd, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:28 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:28 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:28 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x40086602, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:28 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:28 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:28 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:28 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x40087602, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:28 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:28 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) 14:24:28 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xf, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:28 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x40186366, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:29 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:29 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:29 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000000)=0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x300, 0x0) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) ioctl$FICLONE(r5, 0x40049409, r7) prlimit64(r4, 0xf, &(0x7f0000000040)={0x1, 0x4}, &(0x7f0000000080)) 14:24:29 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:29 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4020940d, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:29 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:29 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:29 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x11, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:29 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x33) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) poll(&(0x7f0000000000)=[{r1, 0x9000}, {r3, 0x9025}, {r7, 0x140c}, {r9, 0x8000}, {r0, 0x420}], 0x5, 0x3) 14:24:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x80045432, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:29 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:29 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, 0x0, 0x0) 14:24:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x80045440, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:29 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000000)=0x1) 14:24:29 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:29 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x12, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x80086301, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:29 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x0) 14:24:29 executing program 3: openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/raw/rawctl\x00', 0x2080, 0x0) r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:30 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:30 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:30 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x13, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x80086601, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:30 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:30 executing program 3: socket$kcm(0xa, 0x0, 0x0) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0xf) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) 14:24:30 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:30 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:30 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:30 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) 14:24:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x80087601, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:30 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:30 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:30 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:30 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0xc0045878, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:30 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x650a03, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000080)={0x6, 0x5, 0x2}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x1, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200c000}, 0x40) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup=r1, r6, 0xc, 0x2, r9}, 0x14) 14:24:30 executing program 2: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 14:24:30 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x16, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:30 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:30 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0xc0045878, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:30 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x80000000, 0x60e2, 0x4, 0x6, 0xffffffff, 0x9, 0x10000, 0xff, 0x401, 0x8000, 0x1000, 0x800, 0xfffffeff, 0x7, 0x1, 0x401, 0x1f, 0x1, 0x80000000, 0x6, 0x80, 0x4, 0x958a, 0x80000000, 0x4, 0x2, 0x6, 0x3, 0x2, 0x0, 0xb1, 0x4c70]}) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000140)={0x7, 0x20493859, 0x2, @discrete={0x5, 0x5}}) fsopen(&(0x7f0000000100)='minix\x00', 0x1) socket$inet(0x2, 0x100006, 0x6) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:30 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:30 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:30 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x17, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0xc0189436, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:31 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:31 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:31 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x18, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0xc020660b, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:31 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fchmod(r2, 0x86) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:31 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:31 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x19, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:31 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:31 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:31 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:31 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:31 executing program 3: r0 = socket(0x10, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000000)) syz_mount_image$ceph(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)='./file0\x00', 0x8001, 0x5, &(0x7f0000001580)=[{&(0x7f0000000240)="881c96ce383484c84ee3c58820a20049e4c7509f2bf16d5cbeffb7aa8d8e93663250a82eddec4be5194c3b3f358b2b0bae81c5cba6f76dca4824b759b450cad8240b2b0b3ac5fc12eb526e89742c71d08ffcc0f627932e3732e3bfa2cc40f5328256573b577396412e10a0a0676671537aa640e23a9df11dc0cf5b2763f14e24583b3bddb93246f83a13444a419ff76a058b704fb304794fe837981e93ca01dfdef543a2c0d5cb30b01d8457377d9d74b16a2de7f35514e74d16aab0997c5a17d69cfdcf82ce079b364fad5652ab9c032df489f0b0239679e00324a425e0ba1833", 0xe1, 0x7}, {&(0x7f0000000340)="cc40e2ce52e60061a23cdcc3e2a91b01671c2e56ec33bbc6917cadef46fde72db2cb62c4d65fc04f8f996d7a3f3f655218405b8fff4232535af21e0543e23e4cfbf6c82cd380f03652017a36d0f2091a9a9af3c051b702025ecbf45c59b63b997e314178207f16f767b527093c90962174c5e614537143eb1e5261697b149e4c6b9b7459be963f926e475fbc56866300bbc61d65e9e12fd4509ec6084d9c10710f84a9c0b8db6f1f4afee36ab4cf21be8af4bb27f490c2a743d19927b98e2eaab2154158e10a0ed422da69164d46217762bb", 0xd2, 0x2400000}, {&(0x7f0000000440)="7a3a1b3cd30489d8d5860c7529375b2b6e689d41f72f66dcf786fdf3cbb876722714508cb5b693bee213e228ed4f36401d9deb3bcad3747fb101bb57f9fb2da3dc4ef9e8a6ed79f2401a635635ee80c2f4dd95ad32b7da41ef89eca6dd143dcdb5de7f0d70015719781071df27f936c8e54eaeebe352a27c7f644a62d265bee515cfb2698214d485e6d21423ada182b79a4dfdb56124490e2e1047609f14fd83603ec158e504394e07b6", 0xaa, 0x100}, {&(0x7f0000000500)="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", 0x1000, 0x800}, {&(0x7f0000001500)="ef6b8ee42974830ebeec8e55740096f7c155a0a1d53ac370c85336c0ab077773ae95e67332ab49aaa8480d8cf107cef11c56cd4f4a76fceb7e03d561d2ff7d0dce3e6a568a1520986dfe92a5df44ca72645f9f5edb10cdab852d24220a99a9367419ed0ccb388c7153e126e6a3e793d5480d731833af662b2f30dbf70041941c", 0x80, 0x2}], 0x200000, &(0x7f0000001600)='\x00') r3 = socket$kcm(0xa, 0x400000005, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200002, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r8, 0x6, 0x4, &(0x7f0000000100)=0x8, 0x4) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0x0) 14:24:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x5, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:31 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) [ 261.329832][T10815] ceph: No path or : separator in source 14:24:32 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1b, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:32 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:32 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0xa, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:32 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:32 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x300, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:32 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x48, 0x0, 0x0) 14:24:32 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:32 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:32 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:32 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x2, 0x19, 0x0, 0x0, 0x0}) 14:24:32 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:32 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:32 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x3, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:33 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x22, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:33 executing program 0: socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, 0x0, 0x0) 14:24:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x4, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x23, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x5, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:33 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x24, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x6, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x25, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:33 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:33 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x7, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:33 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x26, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x10, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:34 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x300, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x27, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:34 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x500, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 0: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x28, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:34 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x600, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x29, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:34 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x700, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:35 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x8a6, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2b, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0xa608, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x1000000, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x2000000, 0x19, 0x0, 0x0, 0x0}) 14:24:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:36 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x3000000, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:36 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x2f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5609, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x4000000, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:36 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x30, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x5000000, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5609, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x31, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x6000000, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 0: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x80fe, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:36 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x32, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:36 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:36 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x7000000, 0x19, 0x0, 0x0, 0x0}) 14:24:36 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5605, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:37 executing program 4: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:37 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x33, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:37 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x10000000, 0x19, 0x0, 0x0, 0x0}) 14:24:37 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clock_gettime(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffe, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001440)={&(0x7f00000000c0)="9c606d4d03ed03b230d0e1e2dd2c5f5dd96b0d60d42d5cd8b758f0b7edf247fee64627b8bb4789c7087c40b8818a", &(0x7f0000000340)=""/4096, &(0x7f0000001340)="def8b58ce0aa48167077e6d2d302e64a5eb7dcf81d357897e6f2560ff8c2b49e5658cac974dc2ee1aef7a96a8d03a2cbb0ec525866fe00231e18070442d20fd047fffc7f1490ac5ddac9f54457b0469a4036c2e25ba16d572b1cf0fbdc10c2b8ee7ad2fc4936135adbd426569ebecccc2e511de7f4199d675fcc54bba5f78d5f81717ee26ce52d03185bf62f8b9ae8ed8b411547363381eb2f998ba521e288a5c3008599", &(0x7f0000001400)="50d724c23524dc2f3483be185fa9263b6aff2000a9f57f4e44aa8fe211db6893b546299de60a5f0527b7634c41730337d26c47", 0x1, r2, 0x4}, 0x38) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x34, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:37 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:37 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0xa6080000, 0x19, 0x0, 0x0, 0x0}) 14:24:37 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:37 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:37 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x35, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:37 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x8, 0x0, 0x0, 0x0}) 14:24:37 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:37 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x36, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 266.945301][T11119] FAULT_INJECTION: forcing a failure. [ 266.945301][T11119] name failslab, interval 1, probability 0, space 0, times 0 [ 267.023226][T11119] CPU: 0 PID: 11119 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 267.031933][T11119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.041998][T11119] Call Trace: [ 267.045302][T11119] dump_stack+0x18f/0x20d [ 267.049650][T11119] should_fail.cold+0x5/0x14 [ 267.054265][T11119] ? tomoyo_realpath_from_path+0xc3/0x620 [ 267.060743][T11119] should_failslab+0x5/0xf [ 267.060783][T11119] __kmalloc+0x27d/0x340 [ 267.069541][T11119] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 267.075128][T11119] tomoyo_realpath_from_path+0xc3/0x620 [ 267.075148][T11119] ? tomoyo_profile+0x42/0x50 [ 267.075166][T11119] tomoyo_path_number_perm+0x1cb/0x4d0 [ 267.092512][T11119] ? tomoyo_path_number_perm+0x183/0x4d0 [ 267.098158][T11119] ? tomoyo_execute_permission+0x470/0x470 [ 267.104025][T11119] ? lock_acquire+0x1f1/0xad0 [ 267.108712][T11119] ? delayed_put_pid+0x30/0x30 [ 267.113523][T11119] ? lock_is_held_type+0xb0/0xe0 14:24:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) [ 267.118491][T11119] ? selinux_inode_getsecctx+0x90/0x90 [ 267.123969][T11119] ? __mutex_unlock_slowpath+0xe2/0x610 [ 267.129535][T11119] ? lock_is_held_type+0xb0/0xe0 [ 267.134487][T11119] ? __fget_files+0x294/0x400 [ 267.139236][T11119] security_file_ioctl+0x50/0xb0 [ 267.144198][T11119] ksys_ioctl+0x50/0x180 [ 267.148456][T11119] __x64_sys_ioctl+0x6f/0xb0 [ 267.153060][T11119] ? lockdep_hardirqs_on+0x6a/0xe0 [ 267.158200][T11119] do_syscall_64+0x60/0xe0 [ 267.162631][T11119] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.168557][T11119] RIP: 0033:0x45cc79 [ 267.172462][T11119] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.192074][T11119] RSP: 002b:00007ffa47dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.200499][T11119] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 [ 267.208490][T11119] RDX: 0000000020001840 RSI: 0000000000004b72 RDI: 0000000000000003 [ 267.216499][T11119] RBP: 00007ffa47dc7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 267.224483][T11119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 267.232466][T11119] R13: 00007ffc47af6c7f R14: 00007ffa47dc89c0 R15: 000000000078bf0c 14:24:37 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x37, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:37 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) [ 267.299336][T11119] ERROR: Out of memory at tomoyo_realpath_from_path. 14:24:38 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:24:38 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x38, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 14:24:38 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2, 0x0, 0x0}) [ 267.535525][T11147] FAULT_INJECTION: forcing a failure. [ 267.535525][T11147] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 267.548958][T11147] CPU: 0 PID: 11147 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 267.557639][T11147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.567701][T11147] Call Trace: [ 267.571008][T11147] dump_stack+0x18f/0x20d [ 267.575385][T11147] should_fail.cold+0x5/0x14 [ 267.579994][T11147] __alloc_pages_nodemask+0x1a3/0x930 [ 267.585480][T11147] ? __alloc_pages_slowpath.constprop.0+0x2780/0x2780 [ 267.592266][T11147] ? lock_downgrade+0x820/0x820 [ 267.597137][T11147] cache_grow_begin+0x8c/0xb20 [ 267.601924][T11147] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 267.607430][T11147] cache_alloc_refill+0x27b/0x340 [ 267.612469][T11147] ? lockdep_hardirqs_off+0x66/0xa0 [ 267.617681][T11147] ? tomoyo_realpath_from_path+0xc3/0x620 [ 267.623416][T11147] __kmalloc+0x319/0x340 [ 267.627680][T11147] tomoyo_realpath_from_path+0xc3/0x620 [ 267.633235][T11147] ? tomoyo_profile+0x42/0x50 [ 267.637948][T11147] tomoyo_path_number_perm+0x1cb/0x4d0 [ 267.643444][T11147] ? tomoyo_path_number_perm+0x183/0x4d0 [ 267.649089][T11147] ? tomoyo_execute_permission+0x470/0x470 [ 267.654910][T11147] ? lock_acquire+0x1f1/0xad0 [ 267.659598][T11147] ? delayed_put_pid+0x30/0x30 [ 267.664387][T11147] ? lock_is_held_type+0xb0/0xe0 [ 267.669360][T11147] ? selinux_inode_getsecctx+0x90/0x90 [ 267.674839][T11147] ? __mutex_unlock_slowpath+0xe2/0x610 [ 267.680433][T11147] ? lock_is_held_type+0xb0/0xe0 [ 267.685400][T11147] ? __fget_files+0x294/0x400 [ 267.690705][T11147] security_file_ioctl+0x50/0xb0 [ 267.695656][T11147] ksys_ioctl+0x50/0x180 [ 267.699908][T11147] __x64_sys_ioctl+0x6f/0xb0 [ 267.704510][T11147] ? lockdep_hardirqs_on+0x6a/0xe0 [ 267.709646][T11147] do_syscall_64+0x60/0xe0 [ 267.714081][T11147] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.719973][T11147] RIP: 0033:0x45cc79 [ 267.723893][T11147] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.743519][T11147] RSP: 002b:00007ffa47dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.743535][T11147] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 14:24:38 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x39, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 267.743544][T11147] RDX: 0000000020001840 RSI: 0000000000004b72 RDI: 0000000000000003 14:24:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 267.743553][T11147] RBP: 00007ffa47dc7ca0 R08: 0000000000000000 R09: 0000000000000000 14:24:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2000001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 267.743562][T11147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 267.743571][T11147] R13: 00007ffc47af6c7f R14: 00007ffa47dc89c0 R15: 000000000078bf0c 14:24:38 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:38 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:38 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x3, 0x0, 0x0}) 14:24:38 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 268.174508][T11176] FAULT_INJECTION: forcing a failure. [ 268.174508][T11176] name failslab, interval 1, probability 0, space 0, times 0 [ 268.192346][T11178] FAULT_INJECTION: forcing a failure. [ 268.192346][T11178] name failslab, interval 1, probability 0, space 0, times 0 [ 268.205144][T11176] CPU: 1 PID: 11176 Comm: syz-executor.4 Not tainted 5.8.0-rc7-syzkaller #0 [ 268.213870][T11176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.223928][T11176] Call Trace: [ 268.227236][T11176] dump_stack+0x18f/0x20d [ 268.231582][T11176] should_fail.cold+0x5/0x14 [ 268.236194][T11176] ? tomoyo_realpath_from_path+0xc3/0x620 [ 268.241934][T11176] should_failslab+0x5/0xf [ 268.246370][T11176] __kmalloc+0x27d/0x340 [ 268.250627][T11176] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 268.256290][T11176] tomoyo_realpath_from_path+0xc3/0x620 [ 268.261854][T11176] ? tomoyo_profile+0x42/0x50 [ 268.266549][T11176] tomoyo_path_number_perm+0x1cb/0x4d0 [ 268.272026][T11176] ? tomoyo_path_number_perm+0x183/0x4d0 [ 268.277673][T11176] ? tomoyo_execute_permission+0x470/0x470 [ 268.283494][T11176] ? lock_acquire+0x1f1/0xad0 [ 268.288181][T11176] ? delayed_put_pid+0x30/0x30 [ 268.292958][T11176] ? lock_is_held_type+0xb0/0xe0 [ 268.297916][T11176] ? selinux_inode_getsecctx+0x90/0x90 [ 268.303387][T11176] ? __mutex_unlock_slowpath+0xe2/0x610 [ 268.308965][T11176] ? lock_is_held_type+0xb0/0xe0 [ 268.313916][T11176] ? __fget_files+0x294/0x400 [ 268.318615][T11176] security_file_ioctl+0x50/0xb0 [ 268.323576][T11176] ksys_ioctl+0x50/0x180 [ 268.327826][T11176] __x64_sys_ioctl+0x6f/0xb0 [ 268.332439][T11176] ? lockdep_hardirqs_on+0x6a/0xe0 [ 268.337558][T11176] do_syscall_64+0x60/0xe0 [ 268.343132][T11176] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 268.349028][T11176] RIP: 0033:0x45cc79 [ 268.352952][T11176] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.372564][T11176] RSP: 002b:00007fd05c467c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.381072][T11176] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 [ 268.389153][T11176] RDX: 0000000020001840 RSI: 0000000000004b72 RDI: 0000000000000003 [ 268.397144][T11176] RBP: 00007fd05c467ca0 R08: 0000000000000000 R09: 0000000000000000 [ 268.405115][T11176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 268.413085][T11176] R13: 00007ffe5f0c29cf R14: 00007fd05c4689c0 R15: 000000000078bf0c [ 268.421086][T11178] CPU: 0 PID: 11178 Comm: syz-executor.0 Not tainted 5.8.0-rc7-syzkaller #0 [ 268.429792][T11178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.429797][T11178] Call Trace: [ 268.429817][T11178] dump_stack+0x18f/0x20d [ 268.429833][T11178] should_fail.cold+0x5/0x14 [ 268.429850][T11178] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 268.429864][T11178] should_failslab+0x5/0xf [ 268.429879][T11178] __kmalloc+0x27d/0x340 [ 268.429895][T11178] ? tomoyo_realpath_from_path+0xc3/0x620 [ 268.429913][T11178] tomoyo_encode2.part.0+0xe9/0x3a0 [ 268.429927][T11178] ? tomoyo_realpath_from_path+0xc3/0x620 [ 268.429943][T11178] tomoyo_encode+0x28/0x50 [ 268.429958][T11178] tomoyo_realpath_from_path+0x186/0x620 [ 268.429978][T11178] tomoyo_path_number_perm+0x1cb/0x4d0 [ 268.429993][T11178] ? tomoyo_path_number_perm+0x183/0x4d0 [ 268.430012][T11178] ? tomoyo_execute_permission+0x470/0x470 [ 268.430028][T11178] ? lock_acquire+0x1f1/0xad0 [ 268.430039][T11178] ? delayed_put_pid+0x30/0x30 [ 268.430061][T11178] ? lock_is_held_type+0xb0/0xe0 [ 268.430090][T11178] ? selinux_inode_getsecctx+0x90/0x90 [ 268.430108][T11178] ? __mutex_unlock_slowpath+0xe2/0x610 [ 268.430123][T11178] ? lock_is_held_type+0xb0/0xe0 [ 268.430143][T11178] ? __fget_files+0x294/0x400 [ 268.430168][T11178] security_file_ioctl+0x50/0xb0 [ 268.550096][T11178] ksys_ioctl+0x50/0x180 [ 268.554369][T11178] __x64_sys_ioctl+0x6f/0xb0 [ 268.558968][T11178] ? lockdep_hardirqs_on+0x6a/0xe0 [ 268.564086][T11178] do_syscall_64+0x60/0xe0 [ 268.568508][T11178] entry_SYSCALL_64_after_hwframe+0x44/0xa9 14:24:39 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 268.574404][T11178] RIP: 0033:0x45cc79 [ 268.578306][T11178] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.598865][T11178] RSP: 002b:00007ffa47dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.607377][T11178] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 [ 268.615357][T11178] RDX: 0000000020001840 RSI: 0000000000004b72 RDI: 0000000000000003 [ 268.623332][T11178] RBP: 00007ffa47dc7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 268.631303][T11178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.639275][T11178] R13: 00007ffc47af6c7f R14: 00007ffa47dc89c0 R15: 000000000078bf0c 14:24:39 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3b, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:39 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x4, 0x0, 0x0}) 14:24:39 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:39 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x5, 0x0, 0x0}) 14:24:39 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:39 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:39 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x6, 0x0, 0x0}) 14:24:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 269.232877][T11176] ERROR: Out of memory at tomoyo_realpath_from_path. 14:24:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:40 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x7, 0x0, 0x0}) 14:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x2, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 269.358464][T11178] ERROR: Out of memory at tomoyo_realpath_from_path. 14:24:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x10, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x10, 0x0, 0x0}) 14:24:40 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x3e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x2, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:40 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x300, 0x0, 0x0}) 14:24:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b2f, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x41, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x10, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x500, 0x0, 0x0}) 14:24:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b30, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x300, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x2405, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 14:24:40 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x600, 0x0, 0x0}) 14:24:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b31, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x4d0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b2f, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x700, 0x0, 0x0}) 14:24:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b32, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:41 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x24330, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b30, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b33, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x8a6, 0x0, 0x0}) 14:24:41 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:41 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x34000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b31, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b34, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0xa608, 0x0, 0x0}) 14:24:41 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b32, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x20000441, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b35, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x1000000, 0x0, 0x0}) 14:24:41 executing program 2: mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:41 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x7ffff000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:41 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b33, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x2000000, 0x0, 0x0}) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b36, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:42 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xfffffdef, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b34, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b37, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x3000000, 0x0, 0x0}) 14:24:42 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3a, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffff1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b35, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x4000000, 0x0, 0x0}) 14:24:42 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffff80, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x5000000, 0x0, 0x0}) 14:24:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b36, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:42 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffff82, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:42 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x6000000, 0x0, 0x0}) 14:24:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b37, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:42 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffffc0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3a, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x7000000, 0x0, 0x0}) 14:24:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b40, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffffc2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b41, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:24:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x10000000, 0x0, 0x0}) 14:24:43 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0xffffffe0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0xa6080000, 0x0, 0x0}) 14:24:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b44, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:24:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b3d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b45, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:24:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b40, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x2, 0x0}) 14:24:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b46, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:43 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x3, 0x0, 0x0}) 14:24:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x3, 0x0}) 14:24:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b41, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b47, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:44 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x4, 0x0}) 14:24:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b44, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b48, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 273.731831][T11439] FAULT_INJECTION: forcing a failure. [ 273.731831][T11439] name failslab, interval 1, probability 0, space 0, times 0 [ 273.784923][T11439] CPU: 0 PID: 11439 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 273.793806][T11439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.803888][T11439] Call Trace: [ 273.803920][T11439] dump_stack+0x18f/0x20d [ 273.803946][T11439] should_fail.cold+0x5/0x14 [ 273.803963][T11439] ? strndup_user+0x70/0xe0 [ 273.803986][T11439] ? strndup_user+0x70/0xe0 [ 273.825163][T11439] should_failslab+0x5/0xf [ 273.829588][T11439] __kmalloc_track_caller+0x27b/0x330 [ 273.834967][T11439] ? fput_many+0x2f/0x1a0 [ 273.839310][T11439] memdup_user+0x22/0xd0 [ 273.843557][T11439] strndup_user+0x70/0xe0 [ 273.847897][T11439] __x64_sys_mount+0xe6/0x230 [ 273.852589][T11439] do_syscall_64+0x60/0xe0 [ 273.857023][T11439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.862923][T11439] RIP: 0033:0x45cc79 14:24:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x5, 0x0}) [ 273.866824][T11439] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.886432][T11439] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.894862][T11439] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 273.902836][T11439] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 273.910822][T11439] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 273.918822][T11439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 273.926801][T11439] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c 14:24:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b45, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b49, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:44 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b46, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x6, 0x0}) 14:24:44 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:45 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4a, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b47, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x7, 0x0}) 14:24:45 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:45 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0xa00842, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@bridge_delvlan={0x54, 0x71, 0x10, 0x70bd2c, 0x25dfdbfc, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x3}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x10, 0x4}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x40, 0x3d}}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x42, 0x1}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r5, 0xc01064bd, &(0x7f0000000200)={&(0x7f00000001c0)="0d7827a95b57e66572261a925c852bb993202be3982c4b408a1dd381156f9e6277bad636b1bdf6db3525c3374a8b45", 0x2f, 0x2}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f0000000240)={&(0x7f00000000c0)="de768de63cc74a29612555f7ed748eb3b12677512ad58be33974493926d4216209f63e4047b86550f21c34198cc7bc17897f8077b355324ff5fa44524e9a2dfd5d08a350c1570a8430874e544f4faa79ab7fcf4b2dc78d5e044045e8de104164d2510e492a4294b28ffd2f06bda317155d985a2cebd110d7d9d83bb6273f8c85cd25c84394feef0e19b8a579c78987b640758ad060aac2a3eee85c2ef152b9fc0e1b511530e8b5436c", 0xa9, r10}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) fcntl$dupfd(r1, 0x0, r0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x10, 0x0}) 14:24:45 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x11}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b48, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 274.582067][T11480] FAULT_INJECTION: forcing a failure. [ 274.582067][T11480] name failslab, interval 1, probability 0, space 0, times 0 14:24:45 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000000)={0x9, [0x101, 0x7, 0x1, 0x766, 0x9, 0x8000, 0x6e85, 0x4, 0x66, 0x80, 0x4, 0xa1, 0x5, 0x1, 0x5, 0x1, 0x40, 0x4, 0xf215, 0x6, 0x20, 0x6, 0x80, 0x2, 0x7, 0x0, 0x8, 0xffff, 0x6, 0x5, 0x8, 0x7, 0x0, 0x9, 0x3, 0x0, 0x4, 0x7, 0x80, 0x2, 0x800, 0x3, 0x8, 0x9, 0xb126, 0x9, 0x98f, 0x6], 0x2}) [ 274.652074][T11480] CPU: 0 PID: 11480 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 274.660781][T11480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.670849][T11480] Call Trace: [ 274.674158][T11480] dump_stack+0x18f/0x20d [ 274.678514][T11480] should_fail.cold+0x5/0x14 [ 274.683125][T11480] should_failslab+0x5/0xf [ 274.687577][T11480] kmem_cache_alloc+0x2a9/0x3b0 [ 274.692463][T11480] getname_flags.part.0+0x50/0x4f0 [ 274.692486][T11480] user_path_at_empty+0xa1/0x100 [ 274.692507][T11480] do_mount+0x140/0x1fe0 [ 274.692532][T11480] ? copy_mount_string+0x40/0x40 [ 274.692548][T11480] ? __might_fault+0x190/0x1d0 [ 274.692563][T11480] ? _copy_from_user+0x138/0x190 [ 274.692582][T11480] ? memdup_user+0x7c/0xd0 [ 274.692605][T11480] __x64_sys_mount+0x18f/0x230 [ 274.692627][T11480] do_syscall_64+0x60/0xe0 [ 274.692647][T11480] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.692662][T11480] RIP: 0033:0x45cc79 14:24:45 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x800, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) [ 274.692682][T11480] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.692693][T11480] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.692710][T11480] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 274.692720][T11480] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 274.692729][T11480] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.692738][T11480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.692757][T11480] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c 14:24:45 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x300, 0x0}) 14:24:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b49, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfc}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:45 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x440080, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0a000002050003001100000000000000007b7e47bc"], 0x1c}, 0x1, 0x0, 0x0, 0x4c000}, 0x20048805) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMON(r5, 0x40045612, &(0x7f0000000040)=0x3) 14:24:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x500, 0x0}) 14:24:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4a, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:45 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x12c}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 275.143162][T11509] FAULT_INJECTION: forcing a failure. [ 275.143162][T11509] name failslab, interval 1, probability 0, space 0, times 0 [ 275.200316][T11509] CPU: 0 PID: 11509 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 275.209025][T11509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.219223][T11509] Call Trace: [ 275.219250][T11509] dump_stack+0x18f/0x20d [ 275.219274][T11509] should_fail.cold+0x5/0x14 [ 275.219297][T11509] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 275.219313][T11509] should_failslab+0x5/0xf [ 275.219330][T11509] __kmalloc+0x27d/0x340 [ 275.219353][T11509] tomoyo_encode2.part.0+0xe9/0x3a0 [ 275.219376][T11509] tomoyo_encode+0x28/0x50 [ 275.219395][T11509] tomoyo_mount_acl+0xe5/0x840 [ 275.219414][T11509] ? __lock_acquire+0xc1e/0x56e0 [ 275.219438][T11509] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 275.219457][T11509] ? avc_has_perm_noaudit+0x1ee/0x390 [ 275.219476][T11509] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 275.219491][T11509] ? avc_has_extended_perms+0xea0/0xea0 [ 275.219509][T11509] ? trace_hardirqs_off+0x27/0x210 [ 275.219550][T11509] ? avc_has_perm_noaudit+0x390/0x390 [ 275.219568][T11509] ? tomoyo_domain+0xb9/0x150 [ 275.219584][T11509] ? tomoyo_profile+0x42/0x50 [ 275.219609][T11509] tomoyo_mount_permission+0x151/0x3f0 [ 275.219628][T11509] ? tomoyo_mount_permission+0xfa/0x3f0 [ 275.219648][T11509] ? tomoyo_mount_acl+0x840/0x840 [ 275.219687][T11509] security_sb_mount+0x66/0xc0 [ 275.219711][T11509] do_mount+0x1c0/0x1fe0 [ 275.219739][T11509] ? copy_mount_string+0x40/0x40 [ 275.219756][T11509] ? __might_fault+0x190/0x1d0 [ 275.219773][T11509] ? _copy_from_user+0x138/0x190 [ 275.219803][T11509] ? memdup_user+0x7c/0xd0 [ 275.352099][T11509] __x64_sys_mount+0x18f/0x230 [ 275.352121][T11509] do_syscall_64+0x60/0xe0 14:24:46 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$isdn_base(r3, &(0x7f0000000000)={0x22, 0x4, 0x80, 0x3c, 0x4}, 0x6) [ 275.352138][T11509] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.352151][T11509] RIP: 0033:0x45cc79 14:24:46 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x300}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:46 executing program 2 (fault-call:1 fault-nth:3): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 275.352167][T11509] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.352175][T11509] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.352190][T11509] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 275.352199][T11509] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 14:24:46 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x5dc}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 275.352208][T11509] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 14:24:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) setsockopt$sock_attach_bpf(r1, 0x29, 0x21, 0x0, 0xffffffffffffffe1) [ 275.352216][T11509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:24:46 executing program 2 (fault-call:1 fault-nth:4): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 275.352225][T11509] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c [ 275.617147][T11534] FAULT_INJECTION: forcing a failure. [ 275.617147][T11534] name failslab, interval 1, probability 0, space 0, times 0 14:24:46 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x600}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 275.617167][T11534] CPU: 1 PID: 11534 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 275.617186][T11534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.617191][T11534] Call Trace: [ 275.617213][T11534] dump_stack+0x18f/0x20d 14:24:46 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x140c, 0x200, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r3, 0x80083314, &(0x7f0000000000)) [ 275.617241][T11534] should_fail.cold+0x5/0x14 [ 275.617264][T11534] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 275.617279][T11534] should_failslab+0x5/0xf [ 275.617294][T11534] __kmalloc+0x27d/0x340 [ 275.617314][T11534] tomoyo_encode2.part.0+0xe9/0x3a0 [ 275.617334][T11534] tomoyo_encode+0x28/0x50 [ 275.617351][T11534] tomoyo_mount_acl+0xe5/0x840 [ 275.617368][T11534] ? __lock_acquire+0xc1e/0x56e0 [ 275.617392][T11534] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 275.617408][T11534] ? avc_has_perm_noaudit+0x1ee/0x390 [ 275.617426][T11534] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 275.617440][T11534] ? avc_has_extended_perms+0xea0/0xea0 [ 275.617455][T11534] ? trace_hardirqs_off+0x27/0x210 [ 275.617487][T11534] ? avc_has_perm_noaudit+0x390/0x390 [ 275.617504][T11534] ? tomoyo_domain+0xb9/0x150 [ 275.617520][T11534] ? tomoyo_profile+0x42/0x50 [ 275.617540][T11534] tomoyo_mount_permission+0x151/0x3f0 [ 275.617556][T11534] ? tomoyo_mount_permission+0xfa/0x3f0 [ 275.617573][T11534] ? tomoyo_mount_acl+0x840/0x840 [ 275.617603][T11534] security_sb_mount+0x66/0xc0 [ 275.617625][T11534] do_mount+0x1c0/0x1fe0 [ 275.617649][T11534] ? copy_mount_string+0x40/0x40 [ 275.617664][T11534] ? __might_fault+0x190/0x1d0 [ 275.617679][T11534] ? _copy_from_user+0x138/0x190 [ 275.617696][T11534] ? memdup_user+0x7c/0xd0 [ 275.617717][T11534] __x64_sys_mount+0x18f/0x230 [ 275.617738][T11534] do_syscall_64+0x60/0xe0 [ 275.617756][T11534] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.617767][T11534] RIP: 0033:0x45cc79 [ 275.617784][T11534] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.617792][T11534] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.617807][T11534] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 275.617816][T11534] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 275.617825][T11534] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.617834][T11534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 275.617844][T11534] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c [ 275.797480][T11543] FAULT_INJECTION: forcing a failure. [ 275.797480][T11543] name failslab, interval 1, probability 0, space 0, times 0 [ 275.797502][T11543] CPU: 0 PID: 11543 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 275.797512][T11543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.797517][T11543] Call Trace: [ 275.797540][T11543] dump_stack+0x18f/0x20d [ 275.797561][T11543] should_fail.cold+0x5/0x14 [ 275.797585][T11543] ? tomoyo_realpath_from_path+0xc3/0x620 [ 275.797599][T11543] should_failslab+0x5/0xf [ 275.797616][T11543] __kmalloc+0x27d/0x340 [ 275.797633][T11543] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 275.797655][T11543] tomoyo_realpath_from_path+0xc3/0x620 [ 275.797673][T11543] ? tomoyo_fill_path_info+0x227/0x410 [ 275.797694][T11543] tomoyo_mount_acl+0x14e/0x840 [ 275.797714][T11543] ? __lock_acquire+0xc1e/0x56e0 [ 275.797748][T11543] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 275.797765][T11543] ? avc_has_perm_noaudit+0x1ee/0x390 [ 275.797782][T11543] ? avc_has_extended_perms+0xea0/0xea0 [ 275.797798][T11543] ? trace_hardirqs_off+0x27/0x210 [ 275.797832][T11543] ? avc_has_perm_noaudit+0x390/0x390 [ 275.797851][T11543] ? tomoyo_domain+0xb9/0x150 [ 275.797866][T11543] ? tomoyo_profile+0x42/0x50 [ 275.797887][T11543] tomoyo_mount_permission+0x151/0x3f0 [ 275.797905][T11543] ? tomoyo_mount_permission+0xfa/0x3f0 [ 275.797931][T11543] ? tomoyo_mount_acl+0x840/0x840 [ 275.797967][T11543] security_sb_mount+0x66/0xc0 [ 275.797992][T11543] do_mount+0x1c0/0x1fe0 [ 275.798017][T11543] ? copy_mount_string+0x40/0x40 [ 275.798034][T11543] ? __might_fault+0x190/0x1d0 [ 275.798051][T11543] ? _copy_from_user+0x138/0x190 [ 275.798074][T11543] ? memdup_user+0x7c/0xd0 [ 275.798100][T11543] __x64_sys_mount+0x18f/0x230 [ 275.798128][T11543] do_syscall_64+0x60/0xe0 [ 275.798148][T11543] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.798162][T11543] RIP: 0033:0x45cc79 [ 275.798182][T11543] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.798191][T11543] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.798207][T11543] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 275.798216][T11543] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 275.798225][T11543] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.798233][T11543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 275.798243][T11543] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c [ 275.814297][T11543] ERROR: Out of memory at tomoyo_realpath_from_path. 14:24:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x600, 0x0}) 14:24:47 executing program 2 (fault-call:1 fault-nth:5): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:47 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa00}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x9, 0x400) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x300, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x9, @link='broadcast-link\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x20044091}, 0x4004004) r3 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0x0) r4 = socket(0x234f86814995598e, 0x3, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$SIOCRSACCEPT(r4, 0x89e3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x17, &(0x7f0000000080)={r8}, 0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)={r8, 0x7, 0x8, [0x93, 0x3, 0x4, 0x5b42, 0x2, 0xfff7, 0xfff7, 0x1]}, 0x18) 14:24:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:47 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf00}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 276.767222][T11566] FAULT_INJECTION: forcing a failure. [ 276.767222][T11566] name failslab, interval 1, probability 0, space 0, times 0 14:24:47 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0xfffffffffffffe2f) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x109000, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) [ 276.831811][T11566] CPU: 0 PID: 11566 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 276.840543][T11566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:24:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b52, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:47 executing program 2 (fault-call:1 fault-nth:6): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 276.840549][T11566] Call Trace: [ 276.840574][T11566] dump_stack+0x18f/0x20d [ 276.840597][T11566] should_fail.cold+0x5/0x14 14:24:47 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1100}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 276.840620][T11566] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 276.840636][T11566] should_failslab+0x5/0xf [ 276.840652][T11566] __kmalloc+0x27d/0x340 [ 276.840675][T11566] tomoyo_encode2.part.0+0xe9/0x3a0 [ 276.840697][T11566] tomoyo_encode+0x28/0x50 [ 276.840716][T11566] tomoyo_mount_acl+0x325/0x840 [ 276.840734][T11566] ? __lock_acquire+0xc1e/0x56e0 [ 276.840758][T11566] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 276.840774][T11566] ? avc_has_perm_noaudit+0x1ee/0x390 [ 276.840791][T11566] ? avc_has_extended_perms+0xea0/0xea0 [ 276.840806][T11566] ? trace_hardirqs_off+0x27/0x210 [ 276.840838][T11566] ? avc_has_perm_noaudit+0x390/0x390 [ 276.840856][T11566] ? tomoyo_domain+0xb9/0x150 [ 276.840884][T11566] ? tomoyo_profile+0x42/0x50 [ 276.840905][T11566] tomoyo_mount_permission+0x151/0x3f0 [ 276.840923][T11566] ? tomoyo_mount_permission+0xfa/0x3f0 [ 276.840942][T11566] ? tomoyo_mount_acl+0x840/0x840 [ 276.840976][T11566] security_sb_mount+0x66/0xc0 [ 276.840999][T11566] do_mount+0x1c0/0x1fe0 [ 276.841025][T11566] ? copy_mount_string+0x40/0x40 [ 276.841041][T11566] ? __might_fault+0x190/0x1d0 [ 276.841056][T11566] ? _copy_from_user+0x138/0x190 [ 276.841075][T11566] ? memdup_user+0x7c/0xd0 [ 276.841097][T11566] __x64_sys_mount+0x18f/0x230 [ 276.841118][T11566] do_syscall_64+0x60/0xe0 [ 276.841137][T11566] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.841151][T11566] RIP: 0033:0x45cc79 [ 276.841171][T11566] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.841180][T11566] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.841197][T11566] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 276.841206][T11566] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 276.841215][T11566] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 276.841223][T11566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 276.841231][T11566] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c [ 277.115313][T11590] FAULT_INJECTION: forcing a failure. [ 277.115313][T11590] name failslab, interval 1, probability 0, space 0, times 0 [ 277.319112][T11590] CPU: 0 PID: 11590 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 277.328073][T11590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.338139][T11590] Call Trace: [ 277.341464][T11590] dump_stack+0x18f/0x20d 14:24:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x700, 0x0}) 14:24:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_macvtap\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0400000200000000000000000500db59050900890b00f3ff0600000002008101fb0000000700000008000000"]}) r3 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$TCSETX(r4, 0x5433, &(0x7f00000000c0)={0x65ac, 0x1, [0x9, 0x2, 0x3, 0x8, 0x2], 0xfd4}) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) getsockopt$inet_udp_int(r5, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) 14:24:48 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 277.345825][T11590] should_fail.cold+0x5/0x14 [ 277.350432][T11590] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 277.355819][T11590] should_failslab+0x5/0xf [ 277.360244][T11590] __kmalloc+0x27d/0x340 [ 277.364530][T11590] tomoyo_encode2.part.0+0xe9/0x3a0 [ 277.369765][T11590] tomoyo_encode+0x28/0x50 [ 277.374192][T11590] tomoyo_mount_acl+0x325/0x840 [ 277.379049][T11590] ? __lock_acquire+0xc1e/0x56e0 [ 277.383998][T11590] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 277.389556][T11590] ? avc_has_perm_noaudit+0x1ee/0x390 14:24:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b60, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 277.394943][T11590] ? avc_has_extended_perms+0xea0/0xea0 [ 277.400496][T11590] ? trace_hardirqs_off+0x27/0x210 [ 277.405643][T11590] ? avc_has_perm_noaudit+0x390/0x390 [ 277.411034][T11590] ? tomoyo_domain+0xb9/0x150 [ 277.415718][T11590] ? tomoyo_profile+0x42/0x50 [ 277.420409][T11590] tomoyo_mount_permission+0x151/0x3f0 [ 277.425879][T11590] ? tomoyo_mount_permission+0xfa/0x3f0 [ 277.431438][T11590] ? tomoyo_mount_acl+0x840/0x840 [ 277.436487][T11590] security_sb_mount+0x66/0xc0 [ 277.441263][T11590] do_mount+0x1c0/0x1fe0 [ 277.445538][T11590] ? copy_mount_string+0x40/0x40 [ 277.450469][T11590] ? __might_fault+0x190/0x1d0 [ 277.455237][T11590] ? _copy_from_user+0x138/0x190 [ 277.460199][T11590] ? memdup_user+0x7c/0xd0 [ 277.464620][T11590] __x64_sys_mount+0x18f/0x230 [ 277.469390][T11590] do_syscall_64+0x60/0xe0 [ 277.473811][T11590] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.479705][T11590] RIP: 0033:0x45cc79 [ 277.483599][T11590] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.503462][T11590] RSP: 002b:00007fe86c39cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.511890][T11590] RAX: ffffffffffffffda RBX: 0000000000020440 RCX: 000000000045cc79 [ 277.519855][T11590] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 277.527824][T11590] RBP: 00007fe86c39cca0 R08: 0000000000000000 R09: 0000000000000000 [ 277.535805][T11590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 277.543775][T11590] R13: 00007fff3ead0a4f R14: 00007fe86c39d9c0 R15: 000000000078bf0c 14:24:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x8a6, 0x0}) 14:24:48 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2c01}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b61, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:48 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) 14:24:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0xa608, 0x0}) 14:24:48 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:24:48 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:48 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:48 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80fe}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x1000000, 0x0}) 14:24:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b4e, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b62, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:48 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xc0fe}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:48 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2, 0x0) 14:24:48 executing program 3: socket$kcm(0xa, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x512080, 0x0) ioctl$HIDIOCGUCODE(r0, 0xc018480d, &(0x7f0000000280)={0x2, 0x3, 0x0, 0x800, 0x8, 0x4}) recvfrom$unix(r0, &(0x7f0000000040)=""/73, 0x49, 0x62, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/ip6_mr_cache\x00') ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000300)={0x7, 'veth1_to_team\x00', {0xf8f4}, 0x1}) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x28, 0x3f7, 0x20, 0x70bd23, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x44010) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000140)=0x3000000) 14:24:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x2000000, 0x0}) 14:24:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b63, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b52, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xdc05}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:49 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x3, 0x0) 14:24:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x3000000, 0x0}) 14:24:49 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) syz_init_net_socket$nfc_raw(0x27, 0x4, 0x0) ptrace$setregs(0xd, r0, 0x9, &(0x7f0000000040)="9bce37e72e93c1467274a0559797e69687b50a27d2dbbff3910b5981f05205d3b4c5ebdf71e02bfb29fa5a9b17019cf42d755b5c978b14ba52894488203958bf1f45e06d2dd4d66d94c7903d5a634333240123bab214419e84f5c5daeca02c38765019159fd203fa74fe19f4581222b35f3e698c55b703df91a36b98bfffd1a1a6f729cc03edf9204bec40fbe8da7dfe8250b5828aff5d46410e68b93e17aa4f82d60b4cabfb5e997dde4b18918e95694513876301b323c7257a8d9395831f995bf771cf5958770ac418b83583a13a35a22d945c7b03e044d22557c55aa95486") 14:24:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b60, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b64, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfc00}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x4000000, 0x0}) 14:24:49 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x4, 0x0) 14:24:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b61, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:24:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b65, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:49 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfe80}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x5000000, 0x0}) 14:24:49 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x5, 0x0) 14:24:49 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x1403, 0x400, 0x70bd2d, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x48805}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r5, 0x4) 14:24:49 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfec0}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x6000000, 0x0}) 14:24:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b66, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 279.329953][T11707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=11707 comm=syz-executor.3 14:24:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b62, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x6, 0x0) 14:24:50 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xff00}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) [ 279.422220][T11711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=11711 comm=syz-executor.3 14:24:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b67, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x7000000, 0x0}) 14:24:50 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8082, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) setsockopt$inet_opts(r4, 0x0, 0x0, &(0x7f0000000040)="fb13cccb5e690f00f762468a63fea154c5a29f1570bb7ea5ba9e85ec899f9defee046c6399e531530d597669db8328afe49b97905d27bb2f48d9b28d0ba238442a0229c734a4f61aadf0f3935f5c41eb7c06a8cccb4b749d6a5cc7fc87f6535ce8d6e2143ec7247f08598f0175fd52966ae65cbb5a11579b67cf6e4a8d57d6a99a352d149345feb2eebd62546733eab76f6f41f17fdd5b140230cdd66c8605f21c2e125996ff483088c2a9c7d8a8d3f26d5e75b25fefb151065bee7d4014aeeda4c25d2a9f345e7f01b2ea3db6d41e18eae1dc21fe1774e3586cd72bb4", 0xdd) fcntl$dupfd(r3, 0x0, r2) setsockopt$sock_attach_bpf(r2, 0x29, 0x21, 0x0, 0xfffffd8f) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet6_IPV6_RTHDR(r8, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c10000100000000fc010000000000000000000000000000ff02000000000000000000000000000100000000000000000000000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000a83200"/136], 0x88) 14:24:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b63, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:50 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x7, 0x0) 14:24:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b68, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x10000000, 0x0}) 14:24:50 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="1d0e673308f3c15d4a05bdf74ab03760", 0x10) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000080)=0x9, 0x4) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) setsockopt$inet6_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "87671bae578b9245", "5ad7e9ade4f190d989ff9be31bd09ae9", "55f21818", "c7b86a81b34310d8"}, 0x28) 14:24:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b64, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:50 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x8, 0x0) 14:24:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0xa6080000, 0x0}) 14:24:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b69, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x9, 0x4802) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b65, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:50 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x10, 0x0) 14:24:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = dup3(r3, r4, 0x0) sendmsg$AUDIT_USER_AVC(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000053040000000000000000df25390700000069a5607a59f89e78b7615c27ad40ba870b9b42cfd0166cc3ea3aa268a4916a2c532d6c2418de428a7021af08c72f32"], 0x44}, 0x1, 0x0, 0x0, 0x20000010}, 0x98a4ce294c0d2546) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6a, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b66, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:51 executing program 3: r0 = socket$kcm(0xa, 0x7, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x8001) socket$kcm(0x29, 0x5, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa37f39cd56ba359d, 0x0) ioctl$KDGETLED(r4, 0x4b31, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x10000) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x2c, r8, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x188, r8, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xd4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MEDIA={0x54, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ab7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f0}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3609}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x56}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe9b}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5d6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc65}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4000000}, 0xc00) 14:24:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000001c0)={0x0, 0xfffffffffffffe56, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x2000c000) 14:24:51 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x19, 0x0) 14:24:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b67, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 280.627951][T11787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=11787 comm=syz-executor.5 [ 280.693915][T11793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=11793 comm=syz-executor.5 14:24:51 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x29, 0x0) 14:24:51 executing program 3: r0 = socket(0x1e, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) r6 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x21, 0x0, 0x0) 14:24:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b68, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xa000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r3, 0x4144, 0x0) 14:24:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2f, 0x0) 14:24:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r3, 0x4018f50b, &(0x7f0000000000)={0x1, 0x0, 0x3}) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000040)={{r8}, 0xbb15, 0x3f, 0x9a2}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b69, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:51 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r3, &(0x7f0000000240)={&(0x7f0000000000)=@isdn={0x22, 0x3, 0x5, 0x1f, 0x40}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="f87e7f7fcbef76ae501b44e3b89873d7465ac3b5b3bea9cd1f84218defe204609bdb8b1bccc6bfd6ca3f37c20f0f0e41a17494ccab45d23a2fb8", 0x3a}, {&(0x7f00000000c0)="85f1caf2ef04aee5877a6cd06332f096cb84cae0af14f2aa56541a574486e602219694725d49df5d60b90eb0fb267b1f7d31c34620f0da865fc981bcc486179fc4f8c696e8dcb5c1399cb39074c2b7b3b21104253cad813a946872f042d479f148c4da70333f9571fa1513e3a01e33af923b933424c1962f3c59dfdef4d1688ce9e3eb0be319b395daef2c7e8fff511decd9369fe336d92ea0fe3f092fa7a683df4a6f1e9ee8d77a71df3ff55741765ed82984b9ed4ed7bcb90b9ff4d601000a8dd9362e", 0xc4}, {&(0x7f00000001c0)="6579c8e1bbbadd367d72e7e4727503a2e752b1e14ad66a36e371cacbb278f127471cba467e1be2fa", 0x28}], 0x3}, 0x40001) 14:24:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b70, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:51 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x35, 0x0) 14:24:51 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6a, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r5, 0x247544e0c8925827, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x2c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r5, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x880}, 0x8000) 14:24:52 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x10, 0x3, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000100)={0x1, 0x0, 0x19, 0x4, 0x0, 0x0}) socket(0x10, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x406, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r6, 0xc058565d, &(0x7f0000000080)={0x2, 0x3, 0x4, 0x4000, 0x2, {0x0, 0xea60}, {0x3, 0x2, 0x7, 0x3, 0x6, 0x8d, "43c43aa7"}, 0x4, 0x7, @planes=&(0x7f0000000000)={0x4, 0x7, @mem_offset=0x6, 0x7}, 0x9, 0x0, r9}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) recvfrom(r3, &(0x7f0000000040)=""/36, 0x24, 0x12163, 0x0, 0x0) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b71, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x11000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:52 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf0, 0x0) 14:24:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfa, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x8000000, 0xcc, 0x0}) 14:24:52 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:52 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_PROTOCOL(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x480c1) 14:24:52 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1f8, 0x0) 14:24:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfb, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c00, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x300, 0x0) 14:24:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b6d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2c010000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:52 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) recvmmsg(r4, &(0x7f0000006600)=[{{&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000280)=""/32, 0x20}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000400)=""/164, 0xa4}], 0x7, &(0x7f0000006d80)=""/246, 0xf6}, 0xfffffffc}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000640)=""/73, 0x49}, {&(0x7f0000000380)=""/60, 0x3c}, {&(0x7f00000037c0)=""/234, 0xea}, {&(0x7f00000038c0)=""/236, 0xec}], 0x4, &(0x7f0000000700)=""/86, 0x56}, 0x9}, {{&(0x7f00000039c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a40)=""/163, 0xa3}, {&(0x7f0000003b00)=""/79, 0x4f}, {&(0x7f0000003b80)=""/106, 0x6a}, {&(0x7f0000003c00)=""/66, 0x42}], 0x4, &(0x7f0000003cc0)=""/119, 0x77}, 0xe6}, {{&(0x7f0000003d40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000005100)=[{&(0x7f0000003dc0)=""/59, 0x3b}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000004e00)=""/106, 0x6a}, {&(0x7f0000004e80)=""/190, 0xbe}, {&(0x7f0000004f40)=""/154, 0x9a}, {&(0x7f0000005000)=""/243, 0xf3}], 0x6}, 0x3ff}, {{0x0, 0x0, &(0x7f0000005280)=[{&(0x7f0000005180)=""/235, 0xeb}], 0x1, &(0x7f00000052c0)=""/236, 0xec}, 0x2}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f00000053c0)=""/73, 0x49}], 0x1, &(0x7f0000005480)=""/65, 0x41}, 0x3}, {{&(0x7f0000005500)=@can, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005580)=""/22, 0x16}], 0x1, &(0x7f0000005600)=""/4096, 0x1000}, 0x81}], 0x7, 0x22, &(0x7f00000067c0)={0x0, 0x3938700}) sendmsg$kcm(r6, &(0x7f0000006d40)={&(0x7f0000006800)=@hci={0x1f, 0x0, 0x4}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006880)="3de0697569ed1cce29513e0fb233ed14e29fc6f67505d3d66a735a797ba11fab13155a0ccd8ddc30d6e5de5795e743e1171359e25551cf0c0f5a2ec2298b686c73098afd7e9d2e7be235afe48780e125ca5659965f7f71d62a92fb2b9b870a1401154a9e29920bce0f43477bebc6b1ab0883f449bd02efe0356b3a53d0a2d271957c10aea1637d023fdd88d5cfeb86fd7f9fd78ede573ffd0667387466f34214b4100f30df2a9db65444b7c1cb96dcebbf77e1aae1a103d56c21c67d6db28880b292535098a6e310be611df4e48baef82d2d9c84c29d5d939a85e97de96833164b", 0xe1}, {&(0x7f0000006980)="bba8add1b4a933f88ca6be0caefa53979d7cd81980b6bd818cd9c541f668ec6fadb8e28a8ba6f348b15e429b87877151f05e7b998ba979421ad505d2d6c2df008c81b11e678d59879c6f7d39317a50ec60a78798bd1f97630b2c790e2e18cb8fc0857630481b52cce008c445d9d2df2fbf4cd1f1ba45c6691c0f3471ec540ab2aa72f0be0302017ccb7e250434b48f1fd8c374e94cff06827c6c40e56c5c29981968d388cce87823768435df196b6c7831b2278e19b9a10c9c3bc09a61e7c9bf3cff6319427dc9ce81aa97f5e33df942e00a7614436359726a1457fc287bbbcf", 0xe0}, {&(0x7f0000006a80)="12cffa782e68698a35825d9b8a220598384961203e446a5918f05d705947e51402aaef413102ba8f94efd0345c15f7c710a9ef709d899865ef454966348b361da481cb87c6d99a00edcfe2038fe49d365c2df0825fbada0c8ca60c63b2d75e13a0fc2818abc5ae391b33df4c5315a5240299bef3c00da673fac27ecae9f1396e744ff8df16b1cd7aa066b791ea94", 0x8e}], 0x3, &(0x7f0000006b80)=[{0x13, 0x118, 0x71, "1cdb1bfa42f955789d0a231610b24a80b77e495b315e7c7c1eea29381a8ec05cacb4f34bcf2a569b69bf4e58f9c63f7feae875e2e3fbaaa2aedef0a8e8a469ea16602d0ac3c89e288d"}], 0x60}, 0x4040881) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@l2={0x1f, 0x4, @any, 0x40ec}, 0xfd6c) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="1107002000000000000804"], 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r8, &(0x7f0000006d00)={&(0x7f0000006c40)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000006cc0)={&(0x7f0000006c80)={0x40, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x16}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x101}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3ad1d49c}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r7, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x24}, 0x1, 0x0, 0x0, 0x400c0}, 0x80) 14:24:52 executing program 5: fanotify_init(0x4, 0x40000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x80000) write$binfmt_elf32(r3, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x8, 0x2, 0x5, 0x3, 0x0, 0x3e, 0x780, 0x313, 0x38, 0x36f, 0x2, 0x2, 0x20, 0x1, 0x80, 0x5, 0x5}, [{0x5, 0x1, 0x8008, 0xea1, 0x10001, 0x3, 0xb1f, 0x10000}, {0x2, 0x3, 0xffff, 0x0, 0x3f, 0x5, 0x8, 0x7fff}], "192bbb1c0a63c3ef6c1b8266b576934e73bd96a18e375f587bb30771953fa100d786bd43ccaf1153e07811b9f52b9de7b6518b02930d7821d3d107f3e4549db6aab3274d372051033d72c9206b51db700e01048f192fc3bd66294fd02a918d87864858296c366edd3ebe24bb01cde6e2957284547e40dc62dac42f11efa5cdb88bc41b277cc07391302af499a9adcd791c058446bbb8ce8a6297f773702d6d01a2", [[], [], [], [], [], []]}, 0x719) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c01, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b70, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x389, 0x0) 14:24:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000000)={0x1}) 14:24:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5409, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b71, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:53 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xdc050000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:53 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x500, 0x0) 14:24:53 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:53 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8509560e29a7b1d2, 0x108, 0x11}, 0x18) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0xf, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x20040095) 14:24:53 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfc000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfa, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:53 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x600, 0x0) 14:24:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x1f, 0x800, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = fcntl$dupfd(r5, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r6, 0xc0285628, &(0x7f0000000040)={0x0, 0xb5}) setsockopt$TIPC_GROUP_LEAVE(r6, 0x10f, 0x88) 14:24:53 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfe800000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4bfb, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:53 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x700, 0x0) 14:24:53 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e22, @multicast1}}) 14:24:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfec00000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c00, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1020, 0x0) 14:24:54 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c01, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xff000000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:54 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1900, 0x0) 14:24:54 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0xf, 0xa, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x3d8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFQA_VLAN={0x3c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x400}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4b8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x7f}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x2}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_PAYLOAD={0x5f, 0xa, "2780d699abc5d357184572d0623bca29b29473878598dce62b599ac9fbbd70d031a2bbdf1ca6ebbf3bf28df64afe2896e5db39035845c4e2976cdb3bbc44e1533990d596db43f0be8abb774a290dd5d81276fad9e6d6509fdad4ad"}, @NFQA_EXP={0xc, 0xf, 0x0, 0x1, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @NFQA_EXP={0x110, 0xf, 0x0, 0x1, [@CTA_EXPECT_NAT={0xfc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x7c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x94}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @mcast1}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xfff}, @NFQA_EXP={0xec, 0xf, 0x0, 0x1, [@CTA_EXPECT_MASTER={0x78, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT={0x70, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_NAT_DIR={0x8}]}]}, @NFQA_VLAN={0x34, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xaa4}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_EXP={0x20, 0xf, 0x0, 0x1, [@CTA_EXPECT_MASTER={0xc, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}]}, @NFQA_CT={0x8c, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x6c, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010102}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'netbios-ns\x00'}}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xfb79}]}, @NFQA_PAYLOAD={0x37, 0xa, "cfa96a8f6701cc787cf5432b465b3348dab22082319d4b49daf681937f5b1258b82c274102f518d90373d8ccce6f285788861f"}]}, 0x3d8}, 0x1, 0x0, 0x0, 0x44}, 0x8800) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'team_slave_0\x00'}) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000100)) 14:24:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c04, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540f, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xffffff7f}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:54 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1f00, 0x0) 14:24:54 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xb295) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x100, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100000000, 0x88000) waitid$P_PIDFD(0x3, r1, &(0x7f0000000080), 0x20000000, &(0x7f0000000100)) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x240001, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000200)=""/7) 14:24:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4c05, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5410, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:54 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000, 0x0) 14:24:54 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000580)={0x1, 0x1, 0x1000, 0xc0, &(0x7f0000000000)="b3ebfc4e3fdb56cd2616a43b33c63a3c3e23d0c41c2a3e3ec721e3e4ad908e9c042d2a32753eb63ebedfc6d25fb6cd01334286d2eb6019ec0180ac80e01ae88953a2d6076ead2a9f0296bacc620fd1abb554f4c333dcee447ef60dcfc14b3eed46489c004da76701c7aae62156c1a9ca0a775596447981d2eea90e6e0d8124a82338df59d215a8e1ddfdb94f8cbfde533fa51b170826dcfea1c1cc0af58ba1b604aa32dbd54e484b8adb94ee7243744f4eafb8236e20b820acde456da30b7cfd", 0xac, 0x0, &(0x7f00000004c0)="76fa1db80e316eae3e21eb0e2828205aebfe97711b1933f8768500bd546fe009968e054372cdf53abb14a71576213e0a4fa1226497fdc1cd71904625cccec59d4cfd1519aa2aef34bca273fd3430254dbc3d002c653666caa1c9c448fc2c654f7accacc1a9a72665e8f78f55997766e7a02adc22fb8389b19653c1a1d3bf1b6cad6c25547540f5ec7f04e688f1e669b9ba86ec86d30c25369c1134c4e623bc3d0952cd64034925edb444f4f2"}) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x2c, 0x3, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @broadcast}, &(0x7f0000000100)=0xc) sendmsg$kcm(r4, &(0x7f0000000480)={&(0x7f0000000140)=@can={0x1d, r7}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)="4f4d6c371892e4f56a890e58bd3315afa53f0dde3db5e91a695dea5c0f301d4b4d36de5cb6e1461b9b9f91c9980cbd8b15f29213ac2544a241bd47b43fc3c36bb6502ca111a5c65516e092b3dee4ed2b340e5be1adf4cd70748fc275c9b331ededced21b38a53c66d5e8ba64fbbbc17eacb255c8d4c6247ddfdff104e94afed75be61984c561dd92bd985edbd7fa05c49ab60cc0529dd99852dd45ccb1e88cfeeaec7abd7e07c1ec09fc36a5728c5d513d4dd3980711b7d30f25bb594051d291e9cb0b1184220f02a2fe1e3c299cbaee46491f35e016ea", 0xd7}, {&(0x7f00000002c0)="670fef90537bb20b49a5cbaf8b7afea158e231b53cb51cdc1fcbb151e3250b9bb13ec51d28c9c18e7724888f85fb68707262bfefc1500e693fb4fc8d9081c1ef262ca9078f966a685e430412e2c50bdb61b976f767e34444cbd2cf8061ea05bde829279a3af45b53f46cd383056e085d1617e37f7dd9a96c23a0e245d2b5147706e8158f99881405a7f7a67432a743ce2344206bf087006a1b7d70b26593b1bd39dea38ed70fed98d3bad54647965a22c7abeabee9b16918babd487b95d5c140e54feec30f6f9a2c21cd7dcd79b68527", 0xd0}, {&(0x7f00000003c0)="7913f8d7cbe9b18543f521bdf09b89b703253b54469a475ca7c84347db708716d185f7e4348a2be24b96a7473f400e201764eab50bb757b108632665662aedc14a609e61d76f6a818746517813b1e2c367e25f0aac669153a9ed88b35335a94a272466639cbafedc0c852a011dc261dc83d5cf13c3", 0x75}], 0x3}, 0x0) 14:24:54 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5412, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5409, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2010, 0x0) 14:24:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5413, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x15e6, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2900, 0x0) 14:24:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5414, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x200003c0, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1}], 0x1}, 0x40) 14:24:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81000) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, [], 0x1}, 0x0, 0x0, 0x1, 0x1, 0xfffb, 0x0, 0x400000000}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = dup2(r4, 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(r6, &(0x7f0000003800)={0x0, 0x0, &(0x7f00000037c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="2800046e8248a9a55256f31fd33ff774512643fe74e0efd5743e19b3b2808cae0200000000000000e7552f1c200a00000738422ba201796817c739110be65d00ace208929737260bbd0af1470502c826a14ad6f40c", @ANYRESOCT=r2, @ANYRESOCT=r3, @ANYRES16, @ANYRES16], 0x28}, 0x1, 0x0, 0x0, 0x809}, 0x4004800) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000000000001050001000000000014080300fc020000000000000000000000000000050001000000000028f6e8e3f54b1261400be9755feefb1f23c288df40579e490225e824a712b5ccd3312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab208d44fb1d27ccefc871c058db47eeac6111786c987cabc639c84de38a4c31c246b84b7ecd41dc45869d0bdfbb9442486951859db03272a4301cf0cb2d3d9cce3de5d07dee0304200578b8216426582c1f792fc125f749c9711bf4c68ec9c1bf2a307fe1218ae470b0af063976281afe7fc0d3aea442df7b96438be42a11c62c334f63b80965afd21909182b52c98ae2029adebd868f5341e2d8a22b20f7a023bf902830416446503ac2ec4043a5513c39a834030064aafcab9db54e64645d24e71b008d25bd4d90ceeb5b6fab601fff6640abf5cb9c40b421f499a7f374071cc71cabef24913f8bcd3f0ef81f3b0e6272db26"], 0x64}, 0x1, 0x0, 0x0, 0x4808}, 0x4000000) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r7, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}]}, 0x40}, 0x1, 0x0, 0x0, 0x24048001}, 0x890) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r8, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2f00, 0x0) 14:24:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5415, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2}], 0x1}, 0x40) [ 284.951703][T12038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12038 comm=syz-executor.5 [ 285.042793][T12046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12046 comm=syz-executor.5 14:24:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x3500, 0x0) 14:24:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540e, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x3}], 0x1}, 0x40) 14:24:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5416, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x3f00, 0x0) 14:24:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x440283, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/220, 0xdc, 0x121, 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfff) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r6 = socket(0x10, 0x5, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000300)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000003c0)={0x6, 0x939, 0x8001, 0x9, [], [], [], 0x1, 0x4, 0x0, 0x1000000, "3322fa37412c95abf51c3c41a74aea04"}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCL_GETSHIFTSTATE(r5, 0x541c, &(0x7f00000002c0)={0x6, 0x7f}) mq_timedsend(r4, &(0x7f0000000000)="4bf9c0a8c2840649ae19546a45bce6d6d1a774a98803d0349cc38bfe8778feb704dee92eabfc94da55824b2a206fc153dd552919cabd09d3ce507d9d0a74b61d5fb160b7b991341009fa0da79a66ff103c533dacaf40c9f86c6230ed19989f729c046c28e67184fcda81a2276973c00ca7a772e58bfe3295c566188ef9d48cf6fc2e03d0fb42eda395c1f6abdc061085dadcc41c1b6407f8656e9d8291f9c43a58a980a224586d93893c07bcb6b1eec4c2f120524607765fd71f51295c3fdfc683bf73a927f833cb6fe24ebf4fb4", 0xce, 0x1000, &(0x7f0000000100)={0x77359400}) 14:24:56 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x4}], 0x1}, 0x40) 14:24:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x540f, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5418, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x4000, 0x0) 14:24:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendfile(r3, r4, &(0x7f0000000080)=0x6, 0x4805dc37) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCGETNODEID(r7, 0x89e1, &(0x7f00000000c0)={0x2}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:56 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x5}], 0x1}, 0x40) 14:24:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5410, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSETMODE(r3, 0x4b3a, 0x1) 14:24:56 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0xe0, 0x10, 0x25f32caec8b44649, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="76a638dc0ffdacad096f8e5bd231646e1deeef2b5a4fc32e1790d016bce9f48c1324336761b070920636092c5c176a268d19e3c14387c45436", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, @generic="b96f78f6a7eea8424beef26010f71c6624130e762d227476e12fa1911933573696ab7db927a497484774fb6d03f6a8510e7da7e9f3406b39d4e4ec2fd65a55c4974246dce5c23edd54bf67983073474246ea8b4ab4b042a961c0a8a05a954543c5ac39eb776646cb5b6b1b4e7716dddb6b7141abfd00000000"]}, 0xe0}}, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x80, r6, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x26}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x100c8ab7a5a172f5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, '(&).\\{]\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '}%}\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000814}, 0x8d0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r4, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r6, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x8, 0x1, '(),\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x8800) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x4e22, 0x7, @private0, 0xfffffe00}}, 0x0, 0x6, [{{0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x1}}, {{0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x80000000}}, {{0xa, 0x4e24, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x101}}, {{0xa, 0x4e24, 0x5205, @local, 0xd221}}, {{0xa, 0x4e20, 0x5c50, @loopback, 0x7}}, {{0xa, 0x4e20, 0x8, @empty, 0x2}}]}, 0x390) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:56 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x8903, 0x0) 14:24:56 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x6}], 0x1}, 0x40) 14:24:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5412, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x1, 0x10, 0x0, 0x0, 0x0}) 14:24:56 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xedc0, 0x0) 14:24:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x3, 'bond_slave_0\x00', {}, 0x3ff}) r2 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x21, 0x0, 0x0) 14:24:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5413, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x7}], 0x1}, 0x40) 14:24:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0xfffffffffffffcd5) 14:24:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5414, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:56 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf000, 0x0) 14:24:56 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x8}], 0x1}, 0x40) 14:24:57 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x4b1f}, 0x8) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000080)=[{&(0x7f0000000000)="e1618803b23869676b2dcf54e4c0985dca9f097f8cde441cc04eb73b863f70d6f634735060f10ea89cf3ef7ba534d5ce03d0fc46fc49a8d6bb88f3b66524473a9efc8426f2339e3a09432dd50a0d7779e88abfa6a067fe4105d506b0670c16579026e605d59349673d3077cb3cbc9c1099ec9e8c3e38a3f961aed3", 0x7b}], 0x1, r4) close(0xffffffffffffffff) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x18, &(0x7f00000000c0)=@assoc_value={r6}, 0x8) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r9, 0xf501, 0x0) ioctl$KDFONTOP_GET(r7, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0xffff, 0x8], 0x2}) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000000)=0x1ff) setsockopt$sock_attach_bpf(r2, 0x29, 0x21, 0x0, 0x0) 14:24:57 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x9}], 0x1}, 0x40) 14:24:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5415, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf801, 0x0) 14:24:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f00000000c0)={0x20}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) fchdir(r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="40000000121408002bbd7000ffdbdf2508000300020000000800150004000000080001000100000008004b00130000000800030003000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000890}, 0x8000) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) 14:24:57 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x44}}}, 0x40, 0x6}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x2, 0x4, 0x1, 0x7, 0x6, 0x7fffffff, 0xfffff800, 0x400000, r7}, &(0x7f0000000240)=0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r4) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)) 14:24:57 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xa}], 0x1}, 0x40) 14:24:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5416, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xff00, 0x0) 14:24:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5421, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 286.814210][ T27] audit: type=1400 audit(1596291897.432:16): avc: denied { create } for pid=12151 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 14:24:57 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xb}], 0x1}, 0x40) 14:24:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5418, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xff03, 0x0) 14:24:57 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x18) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5422, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000000)=0x7090e647) r3 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0x0) 14:24:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:57 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x40000, 0x0) 14:24:57 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xc}], 0x1}, 0x40) 14:24:57 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:57 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x3, 0x4) write$6lowpan_enable(r1, &(0x7f0000000040)='0', 0x1) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1fffff, 0x0) 14:24:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5423, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xd}], 0x1}, 0x40) 14:24:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0xfffffffc, 0x80000019, 0x0, 0x0, 0x0}) 14:24:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5424, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x80000) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) socket$kcm(0xa, 0x400000005, 0x0) 14:24:58 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf0ffff, 0x0) 14:24:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000000)={0x1, "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"}) 14:24:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xe}], 0x1}, 0x40) 14:24:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5425, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f00000001c0)=""/148) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$CHAR_RAW_ROTATIONAL(r8, 0x127e, &(0x7f0000000100)) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x9, 0x3, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4004}, 0x20008895) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:58 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1000000, 0x0) 14:24:58 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_pwait(r4, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0xff, &(0x7f00000000c0)={[0xffffffff]}, 0x8) fcntl$dupfd(r1, 0x0, r0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) fcntl$dupfd(r9, 0x406, r6) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r5, 0x29, 0x21, 0x0, 0x0) 14:24:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x541e, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0xf}], 0x1}, 0x40) 14:24:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5427, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/udp6\x00') accept4$bt_l2cap(r2, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:24:58 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1000002, 0x0) 14:24:58 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@rose, @default, @rose, @null, @rose, @remote, @netrom, @netrom]}, &(0x7f0000000080)=0x48, 0x80000) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:58 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5421, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x10}], 0x1}, 0x40) 14:24:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5428, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x80000000, 0xb, 0xe, 0x87, 0x0}) 14:24:59 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000000)=""/217, 0xd9}, &(0x7f0000000100), 0x2}, 0x20) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:59 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000000, 0x0) 14:24:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5422, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x11}], 0x1}, 0x40) 14:24:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5429, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400020000001d00002b5f80990bf6c1e52d506f6a2b9fc5b08a2d974b8ec56c5761f931b9142a0ee7743470dd1b0b168488595989baa5b8c27c76da9c6076a9cdd6930eb6626d8923cce183669be062f4b4bfe0b2712cc7cb5376d6c6edf341bf56bf9215f58c0053e55dfeb303aa6a59deba5be2fde2029250eb930b454a17373a38aa7e6803223de2586b5513d4112a62c0c78770ec5b7621fb25ba8749a7039779cfa080f9f1e53449f79dd72800b9d65d5ee225f6b9b3822aa3508216b753193474103cbaaef4d667175f9de124c83cf601c76a", @ANYRES32=r8, @ANYBLOB="000002000000ffff0000000a00"/28], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', r8, 0x0, 0xfe, 0x3f, 0x0, 0x4c, @private1={0xfc, 0x1, [], 0x1}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000, 0x700, 0x910, 0x3}}) r10 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r10, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x20001d, 0x2000000, 0x6e, 0x0}) 14:24:59 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x8, 0xbd, [0x8, 0x20]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 14:24:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5423, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x12}], 0x1}, 0x40) 14:24:59 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2000001, 0x0) 14:24:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5437, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 288.808433][T12287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=12287 comm=syz-executor.3 14:24:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5424, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5441, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 288.923915][T12299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=12299 comm=syz-executor.3 14:24:59 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x13}], 0x1}, 0x40) 14:24:59 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x3000000, 0x0) 14:24:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1d, 0x19, 0xfffffffc, 0x0}) 14:24:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5425, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x8000004) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000080)='icmp6\x00', 0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, r7, 0x1, 0x0, 0xffffffff, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCAP(r10, 0x80685600, &(0x7f0000000280)) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r7, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="ef8d8822d8f1"}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c000}, 0x40) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:24:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5450, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x14}], 0x1}, 0x40) 14:24:59 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x4000000, 0x0) 14:24:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5427, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:24:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x16, 0x2, 0x0, 0x0}) ioctl$TIOCCBRK(r0, 0x5428) [ 289.265764][T12315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=12315 comm=syz-executor.3 [ 289.369341][T12319] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=12319 comm=syz-executor.3 14:25:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5451, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x15}], 0x1}, 0x40) 14:25:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5428, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x100) sendmsg(r1, &(0x7f0000000400)={0x0, 0x4e, &(0x7f0000000140)=[{&(0x7f0000000040)="4e867edb1253dd6d7b51486c8cc1066239a85e59eff88a457ff800fd20cf33ddef6a8c7c3d64003b3cbb1d3486283183ee3560f52fb221f0d52443910fcd25a18e9cd29755962f25dcc7c7f42f85bfcb8b1ba74b319d19c071399b96fd4dd00918bec5bce4e3a43a10ce38bcf1215f90e8fdc79e4de344b7817b59a50fc060d301373befa57965d39cc3906cd0ded6aa3c31bab69ccdfbbc2bd17729d7a458bc9a0f1e595e3ae1d5b37731dc2eeae2971ba7fea4a8a1e5da1cdabb3e084c36db5fa492931189bceff9f0606c3fa7896d0f71df458897bcfd2983ab90fbb9"}], 0x0, &(0x7f0000000240)}, 0x4000040) 14:25:00 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x5000000, 0x0) 14:25:00 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffe, 0x0, 0x0) keyctl$link(0x8, r2, r3) 14:25:00 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x16}], 0x1}, 0x40) 14:25:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5452, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5429, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 5: syz_open_dev$char_usb(0xc, 0xb4, 0x8000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:00 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x6000000, 0x0) 14:25:00 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x6, 0x800, 0x101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) r9 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x100) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000000)={r3}) socket$inet_dccp(0x2, 0x6, 0x0) 14:25:00 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x17}], 0x1}, 0x40) 14:25:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x545d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5437, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000000)={0x10000, 0x6000, 0x4, 0x1d, 0x85}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:00 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x7000000, 0x0) 14:25:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r1) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a40000000d0601040000000000000000050000090500010007000000050005000700000016000300686173683a6e65742c706f72742c6e65740000000500010007000000050005000c000000050001000795e0000d0003006c6973743a7365740000000014000300686173683a69702c706f72742c69700015000300686173683a69702c706f72742c6e65740000000012000300686173683a6e65742c706f7274000000"], 0xa4}, 0x1, 0x0, 0x0, 0x80bded4dd167d9ad}, 0x48000) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000080)) 14:25:00 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x18}], 0x1}, 0x40) 14:25:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5460, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RELDISP(r0, 0x5605) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5441, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 290.283886][T12377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=12377 comm=syz-executor.3 14:25:01 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x19}], 0x1}, 0x40) 14:25:01 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x8000000, 0x0) 14:25:01 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x2, 0x800, 0x400) fcntl$dupfd(r1, 0x0, r0) r2 = socket(0x1a, 0x3, 0xfffffffb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) setsockopt$sock_attach_bpf(r4, 0x29, 0x21, 0x0, 0x50) bind$rxrpc(r6, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) 14:25:01 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x200004, 0x16, 0xa3, 0x0}) 14:25:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5600, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5450, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1a}], 0x1}, 0x40) 14:25:01 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x10000000, 0x0) 14:25:01 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x80000) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x17, &(0x7f0000000080)={r7}, 0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r7, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r8, 0x80000000}, &(0x7f0000000100)=0x8) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f0000000000)) 14:25:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5601, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5451, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x8600, 0x0) 14:25:01 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1b}], 0x1}, 0x40) 14:25:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5452, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x7, 0x3, 0x7}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5602, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x19000000, 0x0) 14:25:01 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:25:01 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1c}], 0x1}, 0x40) 14:25:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x545d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1, 0x0, 0xec, 0x3, 0x0, 0x6, 0x1820, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000000040), 0xe}, 0xc00, 0x100000001, 0x6, 0x8, 0x200, 0x0, 0x4}, 0x0, 0x9, r5, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000000)="886e62aacbee6a92e190fa082eeb4e10f014dbc36c0f294c0f5bb9fe56251a222cfa29c4fcfc9f13bd161c01a821ce366c3188870f0e10b682") io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) r7 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x21, 0x0, 0x0) 14:25:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDIO(r6, 0x80345621, &(0x7f0000000000)) 14:25:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5603, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:01 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1f000000, 0x0) 14:25:01 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1d}], 0x1}, 0x40) 14:25:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5460, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x2f) 14:25:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x800010, 0x100008, 0x69, 0x0}) 14:25:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5605, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x20000000, 0x0) 14:25:02 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x1e}], 0x1}, 0x40) 14:25:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5501, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 3: r0 = socket$kcm(0xa, 0x400000007, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3f0200000000003600000001000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x41) 14:25:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000180)={0x3, 0x5, 0x3, 0x7fff, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x302402) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x12, 0x0, 0x0}) 14:25:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5606, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x21}], 0x1}, 0x40) 14:25:02 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x20100000, 0x0) 14:25:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5509, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5607, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 3: r0 = socket$kcm(0xa, 0x400000000, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x1, 0x3, 0x4}}, 0x2e) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r1) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/adsp1\x00', 0x240c02, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x400, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x101, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) accept$unix(r2, 0x0, &(0x7f00000001c0)) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r5, 0x800442d2, &(0x7f00000000c0)={0x6, &(0x7f0000000280)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}]}) ioctl$DRM_IOCTL_MODE_RMFB(0xffffffffffffffff, 0xc00464af, &(0x7f0000000240)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f0000000000)={{0x3, @addr=0x5}, 0x8, 0x0, 0x9}) 14:25:02 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x22}], 0x1}, 0x40) 14:25:02 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x29000000, 0x0) 14:25:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5600, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r2, 0x4004480f, &(0x7f00000001c0)=0x3) syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0xf7, "b5128ae05080b95cc45bd870f020a9622a835bd258ed58180323be367125ec89fe34487a93f80816192c0dcf3195d047d154d64bc414a96dff97482afaa02957d0d2fd21b7e50125c2476fe8a0a95f3b8c77acd12d47d3497384ed328bcf1aee74297a44c78334e8d4f15246f0dac48cf88c25e6aa92888bffdd4fb65fec4f9e50a92be132fcfd3117d853f3265f33288ea036ae3b4303bf221869c4f9c60e32c97c47b23bb4f2542b3fab571bf36f56d14c3c860e35b3152b8937fd977ed37da16d0cb18ae810fecfccb45c6164b2161e31cc7eeea41db4abb525c6a2f3b54f9207e07c6121b3d67ed3f32eacde55172a01254a04828f"}, &(0x7f0000000140)=0x11b) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5608, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:02 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x23}], 0x1}, 0x40) 14:25:02 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x2f000000, 0x0) 14:25:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5601, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) 14:25:03 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5609, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x24}], 0x1}, 0x40) 14:25:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r5 = socket(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r4, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r5}]}, 0x3c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKDISCARD(r8, 0x1277, &(0x7f00000000c0)) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100026bd7000fddbdf25060000000500050003000000080009000400a41408000900030000004c8d3a0109d3c2c946b921e8eea914922e4aa9176aae8830f5dc7ed23ad0c6aafb213c199cbbec56df58f162ad26c84336bc9c026a8c3d148a0bbcb7fce1c6d2d30967793c5ae82a4ae6df0ff5135d2decbb211dcd6223a06067d151271639932d28f1e0"], 0x34}, 0x1, 0x0, 0x0, 0x880}, 0xd4c0f9ca1dab1938) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000000)={0x1, 0x0, {0x3e6b, 0xe6, 0x2016, 0x7, 0x1, 0x4, 0x0, 0x5}}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x20000, 0x0}) 14:25:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5602, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x35000000, 0x0) 14:25:03 executing program 3: r0 = socket$kcm(0xa, 0x400000007, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x82002, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000080)={0x2, 'batadv_slave_0\x00', {}, 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\x00') 14:25:03 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x25}], 0x1}, 0x40) 14:25:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x1, 0x19, 0xf, 0x0, 0x0}) 14:25:03 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x3f000000, 0x0) 14:25:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5603, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560a, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x26}], 0x1}, 0x40) 14:25:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r1 = socket(0x1f, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000000)=0x3) 14:25:03 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x40000000, 0x0) 14:25:03 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) socket$inet6(0xa, 0xa, 0x5) syz_io_uring_setup(0xc14, &(0x7f0000000000)={0x0, 0xb9b4, 0x1, 0x1, 0x208}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:25:03 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x27}], 0x1}, 0x40) 14:25:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5605, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560b, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r2, 0x29, 0xfa, 0xb4, 0x80000001, 0x2, @private0={0xfc, 0x0, [], 0x1}, @private2={0xfc, 0x2, [], 0x1}, 0x10, 0x7800, 0x0, 0x3}}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0x51d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x2}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_blackhole={0xe, 0x1, 'blackhole\x00'}]}, 0x34}}, 0x0) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getpeername$packet(r10, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000300)={0x1, 0x0, 0x19, 0x2, 0x2, 0x0}) 14:25:04 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x89030000, 0x0) 14:25:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5606, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x28}], 0x1}, 0x40) 14:25:04 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560c, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea193ce8d7ee2de376a563da4624443ed9c26199c2fa85b85dd60a14", 0x28, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$describe(0x6, r5, &(0x7f0000000040)=""/197, 0xc5) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000000)={0x533f, 0x9b, 0x90, @broadcast, 'bridge_slave_0\x00'}) 14:25:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5607, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x29}], 0x1}, 0x40) 14:25:04 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) 14:25:04 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560d, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x8cffffff, 0x0) 14:25:04 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "713f6529f16a5e01e37f3ca354049353c4da2b72"}, 0x15, 0x3) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000000)={0xffff, 0xffffffc1}) 14:25:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5608, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2a}], 0x1}, 0x40) 14:25:04 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000000)={0x1, 0x4, 0x1e, 0x2, 0x0, 0x0}) 14:25:04 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xc0ed0000, 0x0) 14:25:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5609, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:25:04 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2b}], 0x1}, 0x40) 14:25:04 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf0ffffff, 0x0) 14:25:04 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000000)={0xa0002010}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r8, 0x28, 0x1, &(0x7f0000000040)=0x7fffffff, 0x8) 14:25:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560a, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:04 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x40) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)='-,@,\\\x00', 0x6, 0x2) [ 294.276055][ T27] audit: type=1400 audit(1596291904.892:17): avc: denied { block_suspend } for pid=12650 comm="syz-executor.5" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 14:25:04 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2c}], 0x1}, 0x40) 14:25:05 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf6ffffff, 0x0) 14:25:05 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560f, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x81, 0x1080) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x2, 0x14, 0xffffffff, 0xdc, 0x0}) 14:25:05 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) 14:25:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560b, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2d}], 0x1}, 0x40) 14:25:05 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xf8010000, 0x0) 14:25:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000000)={0xe, {0x5, 0xff, 0xee, 0x1000, "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"}}, 0x100c) r3 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x21, 0x0, 0x0) 14:25:05 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xfeffffff, 0x0) 14:25:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560c, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2e}], 0x1}, 0x40) 14:25:05 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x6364, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560d, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xff000000, 0x0) 14:25:05 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x641e, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:05 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x2f}], 0x1}, 0x40) 14:25:05 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x28080) r7 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r9, 0x301, &(0x7f0000000000)) 14:25:06 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x8912, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:06 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xff030000, 0x0) 14:25:06 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x30}], 0x1}, 0x40) 14:25:06 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000040)={[0x1, 0x0, 0x1000, 0x840649e5ccf95313], 0xffffffff, 0x1, 0x1}) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_STREAMOFF(r6, 0x40045612, &(0x7f0000000000)=0x1) 14:25:06 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x8933, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:06 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x31}], 0x1}, 0x40) 14:25:06 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xffff1f00, 0x0) 14:25:06 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) 14:25:06 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400448c9, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:06 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xfffff000, 0x0) 14:25:06 executing program 3: socket$kcm(0xa, 0x400000005, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000000c0)) exit(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r2) setsockopt$sock_attach_bpf(r2, 0x29, 0x21, 0x0, 0xff9d) 14:25:06 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x32}], 0x1}, 0x40) 14:25:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560f, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400448dd, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xffffff7f, 0x0) 14:25:07 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x33}], 0x1}, 0x40) 14:25:07 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r4) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) 14:25:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x400454ca, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xffffff8c, 0x0) 14:25:07 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x34}], 0x1}, 0x40) 14:25:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x6364, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x40049409, &(0x7f0000001840)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 3: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'caif0\x00', {'veth1_to_bond\x00'}, 0x800}) 14:25:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000001840)={0x1, 0x0, 0x19, 0x0, 0x0, 0x0}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)={0x1, 0x1, 0xb, 0x20, 0x52}) 14:25:07 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x8912, &(0x7f0000001840)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:25:07 executing program 1: r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x1e8) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)="89", 0x35}], 0x1}, 0x40) 14:25:07 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0xfffffff0, 0x0) [ 297.090859][T12784] ================================================================== [ 297.090950][T12784] BUG: KASAN: slab-out-of-bounds in fbcon_get_font+0x2f4/0x6f0 [ 297.090963][T12784] Read of size 16 at addr ffff88804d2c6910 by task syz-executor.5/12784 [ 297.090968][T12784] [ 297.090986][T12784] CPU: 0 PID: 12784 Comm: syz-executor.5 Not tainted 5.8.0-rc7-syzkaller #0 [ 297.090997][T12784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.091003][T12784] Call Trace: [ 297.091033][T12784] dump_stack+0x18f/0x20d [ 297.091052][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.091066][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.091088][T12784] print_address_description.constprop.0.cold+0xae/0x436 [ 297.091111][T12784] ? lockdep_hardirqs_off+0x66/0xa0 [ 297.091135][T12784] ? vprintk_func+0x97/0x1a6 [ 297.091155][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.091170][T12784] kasan_report.cold+0x1f/0x37 [ 297.091199][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.091219][T12784] check_memory_region+0x13d/0x180 [ 297.091258][T12784] memcpy+0x20/0x60 [ 297.091275][T12784] fbcon_get_font+0x2f4/0x6f0 [ 297.091295][T12784] ? fbcon_resize+0x610/0x610 [ 297.091312][T12784] con_font_op+0x1f5/0x1110 [ 297.091332][T12784] ? lock_downgrade+0x820/0x820 [ 297.091346][T12784] ? con_write+0xb0/0xb0 [ 297.091373][T12784] ? __might_fault+0x190/0x1d0 [ 297.091395][T12784] vt_ioctl+0x16dc/0x2670 [ 297.091412][T12784] ? trace_print_print+0x1e/0x110 [ 297.091428][T12784] ? lockdep_hardirqs_on+0x6a/0xe0 [ 297.091442][T12784] ? vt_waitactive+0x350/0x350 [ 297.091464][T12784] ? tomoyo_path_number_perm+0x244/0x4d0 [ 297.091483][T12784] ? tomoyo_execute_permission+0x470/0x470 [ 297.091506][T12784] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 297.091522][T12784] ? tty_jobctrl_ioctl+0x4d/0x1010 [ 297.091536][T12784] ? vt_waitactive+0x350/0x350 [ 297.091554][T12784] tty_ioctl+0x1019/0x15f0 [ 297.091572][T12784] ? tty_fasync+0x390/0x390 [ 297.091590][T12784] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 297.091606][T12784] ? do_vfs_ioctl+0x27d/0x1090 [ 297.091622][T12784] ? generic_block_fiemap+0x60/0x60 [ 297.091640][T12784] ? selinux_inode_getsecctx+0x90/0x90 [ 297.091653][T12784] ? __might_fault+0x190/0x1d0 [ 297.091668][T12784] ? _copy_to_user+0x126/0x160 [ 297.091690][T12784] ? __fget_files+0x294/0x400 [ 297.091714][T12784] ? tty_fasync+0x390/0x390 [ 297.091728][T12784] ksys_ioctl+0x11a/0x180 [ 297.091748][T12784] __x64_sys_ioctl+0x6f/0xb0 [ 297.091765][T12784] ? lockdep_hardirqs_on+0x6a/0xe0 [ 297.091782][T12784] do_syscall_64+0x60/0xe0 [ 297.091799][T12784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.091811][T12784] RIP: 0033:0x45cc79 [ 297.091828][T12784] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.091838][T12784] RSP: 002b:00007f48f0a21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.091854][T12784] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 [ 297.091863][T12784] RDX: 0000000020000400 RSI: 0000000000004b72 RDI: 0000000000000003 [ 297.091878][T12784] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 297.091887][T12784] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 297.091897][T12784] R13: 00007ffe554c9b2f R14: 00007f48f0a229c0 R15: 000000000078bf0c [ 297.091918][T12784] [ 297.091926][T12784] Allocated by task 9487: [ 297.091942][T12784] save_stack+0x1b/0x40 [ 297.091955][T12784] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 297.091969][T12784] __kmalloc+0x17a/0x340 [ 297.091984][T12784] fbcon_set_font+0x34f/0x8b0 [ 297.091995][T12784] con_font_op+0xd25/0x1110 [ 297.092006][T12784] vt_ioctl+0x1180/0x2670 [ 297.092019][T12784] tty_ioctl+0x1019/0x15f0 [ 297.092031][T12784] ksys_ioctl+0x11a/0x180 [ 297.092043][T12784] __x64_sys_ioctl+0x6f/0xb0 [ 297.092056][T12784] do_syscall_64+0x60/0xe0 [ 297.092071][T12784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.092075][T12784] [ 297.092083][T12784] Freed by task 8158: [ 297.092099][T12784] save_stack+0x1b/0x40 [ 297.092112][T12784] __kasan_slab_free+0xf5/0x140 [ 297.092125][T12784] kfree+0x103/0x2c0 [ 297.092139][T12784] skb_release_data+0x6d9/0x910 [ 297.092151][T12784] consume_skb+0xc2/0x160 [ 297.092241][T12784] nsim_dev_trap_report_work+0x889/0xbe0 [ 297.092260][T12784] process_one_work+0x94c/0x1670 [ 297.092275][T12784] worker_thread+0x64c/0x1120 [ 297.092290][T12784] kthread+0x3b5/0x4a0 [ 297.092307][T12784] ret_from_fork+0x1f/0x30 [ 297.092311][T12784] [ 297.092325][T12784] The buggy address belongs to the object at ffff88804d2c6000 [ 297.092325][T12784] which belongs to the cache kmalloc-4k of size 4096 [ 297.092340][T12784] The buggy address is located 2320 bytes inside of [ 297.092340][T12784] 4096-byte region [ffff88804d2c6000, ffff88804d2c7000) [ 297.092345][T12784] The buggy address belongs to the page: [ 297.092368][T12784] page:ffffea000134b180 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea000134b180 order:1 compound_mapcount:0 [ 297.092380][T12784] flags: 0xfffe0000010200(slab|head) [ 297.092399][T12784] raw: 00fffe0000010200 ffffea0001477e08 ffffea0001514788 ffff8880aa002000 [ 297.092417][T12784] raw: 0000000000000000 ffff88804d2c6000 0000000100000001 0000000000000000 [ 297.092424][T12784] page dumped because: kasan: bad access detected [ 297.092428][T12784] [ 297.092433][T12784] Memory state around the buggy address: [ 297.092445][T12784] ffff88804d2c6800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.092456][T12784] ffff88804d2c6880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.092467][T12784] >ffff88804d2c6900: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 297.092473][T12784] ^ [ 297.092486][T12784] ffff88804d2c6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 297.092498][T12784] ffff88804d2c6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 297.092504][T12784] ================================================================== [ 297.092508][T12784] Disabling lock debugging due to kernel taint [ 297.108030][T12784] Kernel panic - not syncing: panic_on_warn set ... [ 297.108050][T12784] CPU: 0 PID: 12784 Comm: syz-executor.5 Tainted: G B 5.8.0-rc7-syzkaller #0 [ 297.108059][T12784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.108063][T12784] Call Trace: [ 297.108087][T12784] dump_stack+0x18f/0x20d [ 297.108104][T12784] ? fbcon_get_font+0x2a0/0x6f0 [ 297.108119][T12784] panic+0x2e3/0x75c [ 297.108134][T12784] ? __warn_printk+0xf3/0xf3 [ 297.108152][T12784] ? preempt_schedule_common+0x59/0xc0 [ 297.108175][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.108192][T12784] ? preempt_schedule_thunk+0x16/0x18 [ 297.108207][T12784] ? trace_hardirqs_on+0x55/0x220 [ 297.108222][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.108243][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.108256][T12784] end_report+0x4d/0x53 [ 297.108269][T12784] kasan_report.cold+0xd/0x37 [ 297.108284][T12784] ? fbcon_get_font+0x2f4/0x6f0 [ 297.108299][T12784] check_memory_region+0x13d/0x180 [ 297.108311][T12784] memcpy+0x20/0x60 [ 297.108324][T12784] fbcon_get_font+0x2f4/0x6f0 [ 297.108338][T12784] ? fbcon_resize+0x610/0x610 [ 297.108350][T12784] con_font_op+0x1f5/0x1110 [ 297.108367][T12784] ? lock_downgrade+0x820/0x820 [ 297.108380][T12784] ? con_write+0xb0/0xb0 [ 297.108397][T12784] ? __might_fault+0x190/0x1d0 [ 297.108411][T12784] vt_ioctl+0x16dc/0x2670 [ 297.108426][T12784] ? trace_print_print+0x1e/0x110 [ 297.108443][T12784] ? lockdep_hardirqs_on+0x6a/0xe0 [ 297.108455][T12784] ? vt_waitactive+0x350/0x350 [ 297.108471][T12784] ? tomoyo_path_number_perm+0x244/0x4d0 [ 297.108486][T12784] ? tomoyo_execute_permission+0x470/0x470 [ 297.108506][T12784] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 297.108520][T12784] ? tty_jobctrl_ioctl+0x4d/0x1010 [ 297.108531][T12784] ? vt_waitactive+0x350/0x350 [ 297.108545][T12784] tty_ioctl+0x1019/0x15f0 [ 297.108560][T12784] ? tty_fasync+0x390/0x390 [ 297.108575][T12784] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 297.108588][T12784] ? do_vfs_ioctl+0x27d/0x1090 [ 297.108601][T12784] ? generic_block_fiemap+0x60/0x60 [ 297.108616][T12784] ? selinux_inode_getsecctx+0x90/0x90 [ 297.108626][T12784] ? __might_fault+0x190/0x1d0 [ 297.108638][T12784] ? _copy_to_user+0x126/0x160 [ 297.108653][T12784] ? __fget_files+0x294/0x400 [ 297.108670][T12784] ? tty_fasync+0x390/0x390 [ 297.108681][T12784] ksys_ioctl+0x11a/0x180 [ 297.108695][T12784] __x64_sys_ioctl+0x6f/0xb0 [ 297.108709][T12784] ? lockdep_hardirqs_on+0x6a/0xe0 [ 297.108723][T12784] do_syscall_64+0x60/0xe0 [ 297.108740][T12784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 297.108752][T12784] RIP: 0033:0x45cc79 [ 297.108769][T12784] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.108777][T12784] RSP: 002b:00007f48f0a21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.108790][T12784] RAX: ffffffffffffffda RBX: 000000000000f5c0 RCX: 000000000045cc79 [ 297.108799][T12784] RDX: 0000000020000400 RSI: 0000000000004b72 RDI: 0000000000000003 [ 297.108806][T12784] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 297.108814][T12784] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 297.108822][T12784] R13: 00007ffe554c9b2f R14: 00007f48f0a229c0 R15: 000000000078bf0c [ 297.109856][T12784] Kernel Offset: disabled